Sciweavers

2503 search results - page 58 / 501
» Building Computer Network Attacks
Sort
View
DSN
2006
IEEE
15 years 3 months ago
Assessing the Attack Threat due to IRC Channels
This practical experience report presents the results of an investigation into the threat of attacks associated with the chat medium IRC. A combination of simulated users (i.e., b...
Robert Meyer, Michel Cukier
INFOCOM
2008
IEEE
15 years 4 months ago
Attack-Tolerant Time-Synchronization in Wireless Sensor Networks
—Achieving secure time-synchronization in wireless sensor networks (WSNs) is a challenging, but very important problem that has not yet been addressed effectively. This paper pro...
Xin Hu, Taejoon Park, Kang G. Shin
MOBIHOC
2007
ACM
15 years 9 months ago
Containing denial-of-service attacks in broadcast authentication in sensor networks
Broadcast authentication is an important application in sensor networks. Public Key Cryptography (PKC) is desirable for this application, but due to the resource constraints on se...
Ronghua Wang, Wenliang Du, Peng Ning
DSOM
2009
Springer
15 years 4 months ago
Hidden Markov Model Modeling of SSH Brute-Force Attacks
Abstract. Nowadays, network load is constantly increasing and high-speed infrastructures (1-10Gbps) are becoming increasingly common. In this context, flow-based intrusion detecti...
Anna Sperotto, Ramin Sadre, Pieter-Tjerk de Boer, ...
ACMACE
2007
ACM
15 years 1 months ago
Building a table tennis game for three players
Physical leisure activities such as table tennis provide healthy exercise and can offer a means to connect with others socially; however, players have to be in the same physical l...
Florian Mueller, Martin R. Gibbs