Sciweavers

2503 search results - page 81 / 501
» Building Computer Network Attacks
Sort
View
AINA
2007
IEEE
15 years 1 months ago
Efficient Battery Management for Sensor Lifetime
Abstract--Monitoring and automatic control of building environment is a crucial application of Wireless Sensor Network (WSN) in which maximizing network lifetime is a key challenge...
Malka Halgamuge
DSN
2005
IEEE
15 years 3 months ago
An Experimental Evaluation to Determine if Port Scans are Precursors to an Attack
This paper describes an experimental approach to determine the correlation between port scans and attacks. Discussions in the security community often state that port scans should...
Susmit Panjwani, Stephanie Tan, Keith M. Jarrin, M...
ICN
2009
Springer
15 years 4 months ago
Assessment of Vulnerability of Content Adaptation Mechanisms to RoQ Attacks
Abstract— Current computing systems employ different mechanisms to deal with overload conditions. Of those widely deployed are content adaptation mechanisms whereby the quality l...
Mina Guirguis, Joshua Tharp, Azer Bestavros, Ibrah...
INFOCOM
2012
IEEE
13 years 9 days ago
Di-Sec: A distributed security framework for heterogeneous Wireless Sensor Networks
Wireless Sensor Networks (WSNs) are no longer a nascent technology and today, they are actively deployed as a viable technology in many diverse application domains such as health ...
Marco Valero, Sang Shin Jung, A. Selcuk Uluagac, Y...
DSN
2007
IEEE
15 years 4 months ago
Protecting Cryptographic Keys from Memory Disclosure Attacks
Cryptography has become an indispensable mechanism for securing systems, communications and applications. While offering strong protection, cryptography makes the assumption that ...
Keith Harrison, Shouhuai Xu