Sciweavers

2503 search results - page 204 / 501
» Building Computer Network Attacks
Sort
View
DIMVA
2010
15 years 3 months ago
Conqueror: Tamper-Proof Code Execution on Legacy Systems
We present Conqueror, a software-based attestation scheme for tamper-proof code execution on untrusted legacy systems. Beside providing load-time attestation of a piece of code, Co...
Lorenzo Martignoni, Roberto Paleari, Danilo Brusch...
ICDCSW
2011
IEEE
14 years 1 months ago
Link-Level Network Topology Generation
Abstract—Internet topology generation involves producing synthetic network topologies that imitate the characteristics of the Internet. Although the accuracy of newly developed n...
Mehmet Burak Akgun, Mehmet Hadi Gunes
IPPS
2005
IEEE
15 years 7 months ago
Some Issues in Solving the Anomaly Detection Problem using Immunological Approach
Results of an experimental study of an anomaly detection system based on the paradigm of artificial immune systems (AISs) are presented. Network traffic data are mapped into ant...
Franciszek Seredynski, Pascal Bouvry
ICDCS
1999
IEEE
15 years 6 months ago
Providing Support for Survivable CORBA Applications with the Immune System
The Immune system aimsto provide survivabilityto CORBA applications, enabling them to continue to operate despite malicious attacks, accidents, or faults. Every object within the ...
Priya Narasimhan, Kim Potter Kihlstrom, Louise E. ...
ARESEC
2011
117views more  ARESEC 2011»
14 years 1 months ago
Non-Parallelizable and Non-Interactive Client Puzzles from Modular Square Roots
—Denial of Service (DoS) attacks aiming to exhaust the resources of a server by overwhelming it with bogus requests have become a serious threat. Especially protocols that rely o...
Yves Igor Jerschow, Martin Mauve