Sciweavers

2503 search results - page 30 / 501
» Building Computer Network Attacks
Sort
View
157
Voted
ICDCSW
2005
IEEE
15 years 10 months ago
Increasing Attack Resiliency of Wireless Ad Hoc and Sensor Networks
An ad hoc or sensor network that is employed for security sensitive applications is expected to tolerate a certain quantity of maliciously behaving nodes. Algorithms must be desig...
Harald Vogt
128
Voted
CCR
2010
100views more  CCR 2010»
15 years 5 months ago
Towards understanding bugs in open source router software
Software errors and vulnerabilities in core Internet routers have led to several high-profile attacks on the Internet infrastructure and numerous outages. Building an understandin...
Zuoning Yin, Matthew Caesar, Yuanyuan Zhou
140
Voted
ICAC
2009
IEEE
15 years 11 months ago
NAP: a building block for remediating performance bottlenecks via black box network analysis
Muli Ben-Yehuda, David Breitgand, Michael Factor, ...
APCHI
2008
IEEE
15 years 11 months ago
Denial of Sleeping: Performance Analysis and Counteracting Strategy
Denial of Sleeping is a novel type of potential attacks in wireless network. The object of the attack is a sensor node’s power supply. To make sensors inexpensive so that they ca...
Vladimir V. Shakhov, Hyunseung Choo
134
Voted
AINA
2003
IEEE
15 years 8 months ago
Combating Cyber Terrorism: Countering Cyber Terrorist Advantages of Surprise and Anonymity
The paper proposes ways to counter the Cyber Terrorist (CT) advantages of surprise and anonymity. It recommends the creation of a Cyberint Analysis Center to develop and evaluate ...
Michael W. David, Kouichi Sakurai