Sciweavers

2503 search results - page 209 / 501
» Building Computer Network Attacks
Sort
View
102
Voted
CCGRID
2002
IEEE
15 years 7 months ago
CatNet: Catallactic Mechanisms for Service Control and Resource Allocation in Large-Scale Application-Layer Networks
The aim of the CatNet project is to combine economic and computer science research to provide new coordination mechanisms for large-scale application-layer networks. The ability o...
Oscar Ardaiz, Felix Freitag, Leandro Navarro, Tors...
ACSAC
2003
IEEE
15 years 7 months ago
Automated Analysis for Digital Forensic Science: Semantic Integrity Checking
When computer security violations are detected, computer forensic analysts attempting to determine the relevant causes and effects are forced to perform the tedious tasks of find...
Tye Stallard, Karl N. Levitt
GI
2003
Springer
15 years 7 months ago
Byzantine Failures and Security: Arbitrary is not (always) Random
: The Byzantine failure model allows arbitrary behavior of a certain fraction of network nodes in a distributed system. It was introduced to model and analyze the effects of very s...
Felix C. Gärtner
DCOSS
2010
Springer
15 years 3 months ago
Wireless Jamming Localization by Exploiting Nodes' Hearing Ranges
Jamming attacks are especially harmful when ensuring the dependability of wireless communication. Finding the position of a jammer will enable the network to actively exploit a wid...
Zhenhua Liu, Hongbo Liu, Wenyuan Xu, Yingying Chen
120
Voted
CORR
2011
Springer
156views Education» more  CORR 2011»
14 years 5 months ago
Design of Transport Layer Based Hybrid Covert Channel Detection Engine
: Computer network is unpredictable due to information warfare and is prone to various attacks. Such attacks on network compromise the most important attribute, the privacy. Most o...
Anjan K., Jibi Abraham, Mamatha Jadhav V.