Sciweavers

2503 search results - page 75 / 501
» Building Computer Network Attacks
Sort
View
ICCSA
2005
Springer
15 years 3 months ago
On the Security of Wireless Sensor Networks
Wireless Sensor Networks are extremely vulnerable against any kind of internal or external attacks, due to several factors such as resource-constrained nodes and lack of tamper-res...
Rodrigo Roman, Jianying Zhou, Javier Lopez
DISCEX
2003
IEEE
15 years 3 months ago
Statistical Approaches to DDoS Attack Detection and Response
The nature of the threats posed by Distributed Denial of Service (DDoS) attacks on large networks, such as the Internet, demands effective detection and response methods. These me...
Laura Feinstein, Dan Schnackenberg, Ravindra Balup...
TOG
2010
157views more  TOG 2010»
14 years 4 months ago
Computer-generated residential building layouts
We present a method for automated generation of building layouts for computer graphics applications. Our approach is motivated by the layout design process developed in architectu...
Paul Merrell, Eric Schkufza, Vladlen Koltun
CCS
2008
ACM
14 years 12 months ago
SNAPP: stateless network-authenticated path pinning
This paper examines a new building block for next-generation networks: SNAPP, or Stateless Network-Authenticated Path Pinning. SNAPP-enabled routers securely embed their routing d...
Bryan Parno, Adrian Perrig, Dave Andersen
WWW
2004
ACM
15 years 10 months ago
Spam attacks: p2p to the rescue
We propose a decentralized privacy-preserving approach to spam filtering. Our solution exploits robust digests to identify messages that are a slight variation of one another and ...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...