Sciweavers

2503 search results - page 245 / 501
» Building Computer Network Attacks
Sort
View
BROADNETS
2007
IEEE
15 years 8 months ago
Detecting protected layer-3 rogue APs
— Unauthorized rogue access points (APs), such as those brought into a corporate campus by employees, pose a security threat as they may be poorly managed or insufficiently secu...
Hongda Yin, Guanling Chen, Jie Wang
ICNP
2007
IEEE
15 years 8 months ago
FireCracker: A Framework for Inferring Firewall Policies using Smart Probing
A firewall policy that is correct and complete is crucial to the safety of a computer network. An adversary will benefit a lot from knowing the policy or its semantics. In this pap...
Taghrid Samak, Adel El-Atawy, Ehab Al-Shaer
NSDI
2008
15 years 4 months ago
Passport: Secure and Adoptable Source Authentication
We present the design and evaluation of Passport, a system that allows source addresses to be validated within the network. Passport uses efficient, symmetric-key cryptography to ...
Xin Liu, Ang Li, Xiaowei Yang, David Wetherall
NSDI
2008
15 years 4 months ago
Nysiad: Practical Protocol Transformation to Tolerate Byzantine Failures
The paper presents and evaluates Nysiad,1 a system that implements a new technique for transforming a scalable distributed system or network protocol tolerant only of crash failur...
Chi Ho, Robbert van Renesse, Mark Bickford, Danny ...
EUSFLAT
2007
156views Fuzzy Logic» more  EUSFLAT 2007»
15 years 4 months ago
Fuzzy Calculating and Fuzzy Control in Wireless Sensor Network
At present time configurable wireless sensor networks are given special consideration. Wireless sensor networks are now a static elements union. To make such a network a powerful ...
Irina Kalganova