Sciweavers

2503 search results - page 30 / 501
» Building Computer Network Attacks
Sort
View
ICDCSW
2005
IEEE
15 years 3 months ago
Increasing Attack Resiliency of Wireless Ad Hoc and Sensor Networks
An ad hoc or sensor network that is employed for security sensitive applications is expected to tolerate a certain quantity of maliciously behaving nodes. Algorithms must be desig...
Harald Vogt
CCR
2010
100views more  CCR 2010»
14 years 9 months ago
Towards understanding bugs in open source router software
Software errors and vulnerabilities in core Internet routers have led to several high-profile attacks on the Internet infrastructure and numerous outages. Building an understandin...
Zuoning Yin, Matthew Caesar, Yuanyuan Zhou
71
Voted
ICAC
2009
IEEE
15 years 4 months ago
NAP: a building block for remediating performance bottlenecks via black box network analysis
Muli Ben-Yehuda, David Breitgand, Michael Factor, ...
APCHI
2008
IEEE
15 years 4 months ago
Denial of Sleeping: Performance Analysis and Counteracting Strategy
Denial of Sleeping is a novel type of potential attacks in wireless network. The object of the attack is a sensor node’s power supply. To make sensors inexpensive so that they ca...
Vladimir V. Shakhov, Hyunseung Choo
AINA
2003
IEEE
15 years 1 months ago
Combating Cyber Terrorism: Countering Cyber Terrorist Advantages of Surprise and Anonymity
The paper proposes ways to counter the Cyber Terrorist (CT) advantages of surprise and anonymity. It recommends the creation of a Cyberint Analysis Center to develop and evaluate ...
Michael W. David, Kouichi Sakurai