Sciweavers

2503 search results - page 31 / 501
» Building Computer Network Attacks
Sort
View
ICPADS
2002
IEEE
15 years 2 months ago
Experiences in Building a Scalable Distributed Network Emulation System
Network emulation systems are widely used to explore the behavior of network protocols and to test and evaluate protocol implementations and applications. The major problem of net...
Pei Zheng, Lionel M. Ni
92
Voted
IPSN
2007
Springer
15 years 3 months ago
Building a sensor network of mobile phones
Mobile phones have two sensors: a camera and a microphone. The widespread and ubiquitous nature of mobile phones around the world makes it attractive to build a large-scale sensor...
Aman Kansal, Michel Goraczko, Feng Zhao
ICNP
2002
IEEE
15 years 2 months ago
Attacking DDoS at the Source
Distributed denial-of-service (DDoS) attacks present an Internet-wide threat. We propose D-WARD, a DDoS defense system deployed at source-end networks that autonomously detects an...
Jelena Mirkovic, Gregory Prier, Peter L. Reiher
PERCOM
2008
ACM
15 years 9 months ago
Protecting Users' Anonymity in Pervasive Computing Environments
The large scale adoption of adaptive services in pervasive and mobile computing is likely to be conditioned to the availability of reliable privacy-preserving technologies. Unfort...
Linda Pareschi, Daniele Riboni, Claudio Bettini
DAGSTUHL
1994
14 years 11 months ago
The Rampart Toolkit for Building High-Integrity Services
Abstract. Rampart is a toolkit of protocols to facilitate the development of high-integrity services, i.e., distributed services that retain their availability and correctness desp...
Michael K. Reiter