Sciweavers

2503 search results - page 80 / 501
» Building Computer Network Attacks
Sort
View
CHI
2004
ACM
15 years 10 months ago
Z-Tiles: building blocks for modular, pressure-sensing floorspaces
A new interactive floorspace has been developed which uses modular nodes connected together to create a pressuresensitive area of varying size and shape, giving it the potential t...
Bruce Richardson, Joseph A. Paradiso, Krispin Leyd...
CRYPTO
2010
Springer
170views Cryptology» more  CRYPTO 2010»
14 years 6 months ago
Securing Computation against Continuous Leakage
We present a general method to compile any cryptographic algorithm into one which resists side channel attacks of the only computation leaks information variety for an unbounded nu...
Shafi Goldwasser, Guy N. Rothblum
USS
2008
15 years 6 days ago
Principles for Developing Comprehensive Network Visibility
We argue that for both defending against attacks and apprehending the scope of attacks after they are detected, there is great utility in attaining views of network activity that ...
Mark Allman, Christian Kreibich, Vern Paxson, Robi...
SIGCSE
2002
ACM
125views Education» more  SIGCSE 2002»
14 years 9 months ago
Small-college supercomputing: building a Beowulf cluster at a comprehensive college
A Beowulf cluster is a MIMD multiprocessor built from commodity off-the-shelf personal computers connected via a dedicated network, running free open-source software. Such a clust...
Joel C. Adams, David Vos
ICDCS
2007
IEEE
15 years 4 months ago
Streaming Algorithms for Robust, Real-Time Detection of DDoS Attacks
Effective mechanisms for detecting and thwarting Distributed Denial-of-Service (DDoS) attacks are becoming increasingly important to the success of today’s Internet as a viable ...
Sumit Ganguly, Minos N. Garofalakis, Rajeev Rastog...