Sciweavers

2503 search results - page 32 / 501
» Building Computer Network Attacks
Sort
View
DSN
2008
IEEE
15 years 4 months ago
On localization attacks to Internet Threat Monitors: An information-theoretic framework
Internet Threat Monitoring (ITM) systems are a widely deployed facility to detect, analyze, and characterize dangerous Internet threats such as worms and distributed denial-of-ser...
Wei Yu, Nan Zhang 0004, Xinwen Fu, Riccardo Bettat...
CORR
2010
Springer
175views Education» more  CORR 2010»
14 years 9 months ago
Detecting Security threats in the Router using Computational Intelligence
Information security is an issue of global concern. As the Internet is delivering great convenience and benefits to the modern society, the rapidly increasing connectivity and acc...
J. Visumathi, K. L. Shunmuganathan
ACMSE
2005
ACM
15 years 3 months ago
Investigating hidden Markov models capabilities in anomaly detection
Hidden Markov Model (HMM) based applications are common in various areas, but the incorporation of HMM's for anomaly detection is still in its infancy. This paper aims at cla...
Shrijit S. Joshi, Vir V. Phoha
MASS
2010
156views Communications» more  MASS 2010»
14 years 7 months ago
On application of Host Identity Protocol in wireless sensor networks
Recent advances in development of low-cost wireless sensor platforms open up opportunities for novel wireless sensor network (WSN) applications. Likewise emerge security concerns o...
Andrey Khurri, Dmitriy Kuptsov, Andrei Gurtov
MOBIHOC
2007
ACM
15 years 9 months ago
Surviving attacks on disruption-tolerant networks without authentication
Disruption-Tolerant Networks (DTNs) deliver data in network environments composed of intermittently connected nodes. Just as in traditional networks, malicious nodes within a DTN ...
John Burgess, George Dean Bissias, Mark D. Corner,...