Sciweavers

2503 search results - page 39 / 501
» Building Computer Network Attacks
Sort
View
BROADNETS
2007
IEEE
15 years 4 months ago
Assessing discreet packet-dropping attacks using nearest-neighbor and path-vector attribution
— A Mobile Ad-Hoc Network (MANET) is considered with nodes that may act selfishly or maliciously by simply dropping data packets rather than forwarding them. We study a distribu...
Arnab Das 0002, George Kesidis, Venkat Pothamsetty
NCA
2006
IEEE
15 years 3 months ago
Experience with some Principles for Building an Internet-Scale Reliable System
We discuss the design methodology used to achieve commercial-quality reliability in the Akamai content delivery network. The network consists of 15,000+ servers in 1,100+ networks...
Mike Afergan
NDSS
2003
IEEE
15 years 3 months ago
Secure IP Telephony using Multi-layered Protection
This paper presents the design and analysis of a multilayer protection scheme against denial-of-service (DoS) attacks in IP telephony enabled enterprise networks. While there are ...
Brennen Reynolds, Dipak Ghosal
WISEC
2010
ACM
14 years 10 months ago
Attacks on physical-layer identification
Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperf...
Boris Danev, Heinrich Luecken, Srdjan Capkun, Kari...
IJCNN
2000
IEEE
15 years 2 months ago
Applying CMAC-Based On-Line Learning to Intrusion Detection
The timely and accurate detection of computer and network system intrusions has always been an elusive goal for system administrators and information security researchers. Existin...
James Cannady