Sciweavers

2503 search results - page 95 / 501
» Building Computer Network Attacks
Sort
View
NCA
2003
IEEE
15 years 3 months ago
Adaptive Use of Network-Centric Mechanisms in Cyber-Defense
Attacks against distributed systems frequently start at the network layer by gathering network related information (such as open TCP ports) and continue on by exhausting resources...
Michael Atighetchi, Partha Pratim Pal, Franklin We...
HPDC
2002
IEEE
15 years 2 months ago
GriPhyN and LIGO, Building a Virtual Data Grid for Gravitational Wave Scientists
Many Physics experiments today generate large volumes of data. That data is then processed in a variety of ways in order to achieve the understanding of fundamental physical pheno...
Ewa Deelman, Carl Kesselman, Gaurang Mehta, Leila ...
GECCO
2008
Springer
196views Optimization» more  GECCO 2008»
14 years 11 months ago
A fuzzy-genetic approach to network intrusion detection
Computer networks have expanded significantly in use and numbers. This expansion makes them more vulnerable to attack by malicious agents. Many current intrusion detection systems...
Terrence P. Fries
ESAS
2005
Springer
15 years 3 months ago
Remote Software-Based Attestation for Wireless Sensors
Wireless sensor networks are envisioned to be deployed in mission-critical applications. Detecting a compromised sensor, whose memory contents have been tampered, is crucial in the...
Mark Shaneck, Karthikeyan Mahadevan, Vishal Kher, ...
63
Voted
CCS
2003
ACM
15 years 3 months ago
Anomaly detection of web-based attacks
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
Christopher Krügel, Giovanni Vigna