Sciweavers

2503 search results - page 7 / 501
» Building Computer Network Attacks
Sort
View
RAID
1999
Springer
15 years 5 months ago
Intrusion Detection for an On-Going Attack
An intrusion-detection system (IDS) for an on-going attack is described. Prior to an attack, an IDS operates in anticipation of a general threat. During an attack, the IDS can dea...
Jim Yuill, Shyhtsun Felix Wu, Fengmin Gong, Ming-Y...
PERCOM
2011
ACM
14 years 5 months ago
Inference attacks by third-party extensions to social network systems
—We study inference attacks that can be launched via the extension API of Facebook. We explain the threat of these attacks through a reduction to authentication attacks, devise a...
Seyed Hossein Ahmadinejad, Mohd M. Anwar, Philip W...
PERCOM
2005
ACM
16 years 26 days ago
Towards an Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computing Devices
Mobile computers are subject to a unique form of denial of service attack known as a battery exhaustion attack, in which an attacker attempts to rapidly drain the battery of the d...
Daniel C. Nash, Thomas L. Martin, Dong S. Ha, Mich...