Sciweavers

2503 search results - page 28 / 501
» Building Computer Network Attacks
Sort
View
PERCOM
2005
ACM
15 years 9 months ago
Link Layer Security for SAHN Protocols
Abstract-- Wireless networks are at risk of security attacks since transmissions can be intercepted by anyone within the transmission range. Therefore participating entities should...
Muhammad Mahmudul Islam, Ronald Pose, Carlo Kopp
AINA
2003
IEEE
15 years 1 months ago
Using SOAP and .NET Web Service to Build SCORM RTE and LMS
Timothy K. Shih, Wen-Chih Chang, Nigel H. Lin, Lou...
CCS
2008
ACM
14 years 11 months ago
Secure neighbor discovery in wireless networks: formal investigation of possibility
Wireless communication enables a broad spectrum of applications, ranging from commodity to tactical systems. Neighbor discovery (ND), that is, determining which devices are within...
Marcin Poturalski, Panos Papadimitratos, Jean-Pier...
APSEC
2004
IEEE
15 years 1 months ago
Top-Down Approach Toward Building Ubiquitous Sensor Network Applications
Tiny networked sensor devices will be disseminated over our physical life space, and take a significant role in realizing a ubiquitous computing environment. As sensor network tec...
Yoshihiro Kawahara, Nao Kawanishi, Hiroyuki Morika...
COMPSEC
2002
185views more  COMPSEC 2002»
14 years 9 months ago
A framework for understanding and predicting insider attacks
In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
E. Eugene Schultz