Sciweavers

2503 search results - page 40 / 501
» Building Computer Network Attacks
Sort
View
IPPS
2007
IEEE
15 years 4 months ago
Improving Secure Communication Policy Agreements by Building Coalitions
In collaborative applications, participants agree on certain level of secure communication based on communication policy specifications. Given secure communication policy speciļ¬...
Srilaxmi Malladi, Sushil K. Prasad, Shamkant B. Na...
NAS
2010
IEEE
14 years 8 months ago
Label-Based DV-Hop Localization Against Wormhole Attacks in Wireless Sensor Networks
Node localization becomes an important issue in the wireless sensor network as its broad applications in environment monitoring, emergency rescue and battlefield surveillance, et...
Junfeng Wu, Honglong Chen, Wei Lou, Zhibo Wang, Zh...
BROADNETS
2007
IEEE
15 years 4 months ago
Strategic deployment of network monitors for attack attribution
—Attacks launched over the Internet have become a pressing problem. Attackers make use of a variety of techniques to anonymize their traffic, in order to escape detection and pr...
Young June Pyun, Douglas S. Reeves
ICDCS
2005
IEEE
15 years 3 months ago
On Flow Marking Attacks in Wireless Anonymous Communication Networks
— This paper studies the degradation of anonymity in a flow-based wireless mix network under flow marking attacks, in which an adversary embeds a recognizable pattern of marks ...
Xinwen Fu, Ye Zhu, Bryan Graham, Riccardo Bettati,...
VIZSEC
2007
Springer
15 years 3 months ago
Visualizing Network Security Events Using Compound Glyphs from a Service-Oriented Perspective
ct Network security is the complicated field of controlling access within a computer network. One of the difficulties in network security is detecting the presence, severity, and ...
Jason Pearlman, Penny Rheingans