Sciweavers

2503 search results - page 236 / 501
» Building Computer Network Attacks
Sort
View
112
Voted
EUC
2007
Springer
15 years 8 months ago
Scriptable Sensor Network Based Home-Automation
Today, proprietary home automation targets very specific applications which operate mostly on a cable based infrastructure. In contrast to that, our implementation builds a wirele...
Thomas Haenselmann, Thomas King, Marcel Busse, Wol...
89
Voted
ER
2006
Springer
83views Database» more  ER 2006»
15 years 6 months ago
Time-Aggregated Graphs for Modeling Spatio-temporal Networks
regated Graphs for Modeling Spatio-Temporal Networks - An Extended Abstract Technical Report Department of Computer Science and Engineering University of Minnesota 4-192 EECS Build...
Betsy George, Shashi Shekhar
LCN
2007
IEEE
15 years 9 months ago
Towards Stateless Single-Packet IP Traceback
The current Internet architecture allows malicious nodes to disguise their origin during denial-of-service attacks with IP spoofing. A well-known solution to identify these nodes...
Rafael P. Laufer, Pedro B. Velloso, Daniel de Oliv...
112
Voted
RAID
2007
Springer
15 years 8 months ago
Emulation-Based Detection of Non-self-contained Polymorphic Shellcode
Network-level emulation has recently been proposed as a method for the accurate detection of previously unknown polymorphic code injection attacks. In this paper, we extend network...
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...
100
Voted
ICPADS
2006
IEEE
15 years 8 months ago
Coloring the Internet: IP Traceback
Several IP Traceback schemes employing packet marking have been proposed to trace DoS/DDoS attacks that use source address spoofing. The major challenges in the design of an ef...
Muthusrinivasan Muthuprasanna, G. Manimaran, Manso...