Sciweavers

2503 search results - page 96 / 501
» Building Computer Network Attacks
Sort
View
ICC
2007
IEEE
173views Communications» more  ICC 2007»
15 years 4 months ago
A Dynamic Stateful Multicast Firewall
—Enterprises are faced with the challenge of enabling IP multicast applications without exposing their network to multicast denial-of-service attacks. Current practice is to use ...
Shen Li, Vijay Sivaraman, Alex Krumm-Heller, Craig...
HIP
2005
Springer
208views Cryptology» more  HIP 2005»
15 years 3 months ago
Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks
In this paper, we propose a new class of Human Interactive Proofs (HIPs) that allow a human to distinguish one computer from another. Unlike traditional HIPs, where the computer is...
Rachna Dhamija, J. D. Tygar
ICDCSW
2002
IEEE
15 years 2 months ago
An Architecture Concept for Ubiquitous Computing Aware Wearable Computers
In Marc Weiser’s vision of ubiquitous computing, users are located in an environment with potentially thousands of computers around them. Many capabilities of these smart device...
Martin Bauer, Bernd Brügge, Gudrun Klinker, A...
MOBISYS
2006
ACM
15 years 9 months ago
Building realistic mobility models from coarse-grained traces
In this paper we present a trace-driven framework capable of building realistic mobility models for the simulation studies of mobile systems. With the goal of realism, this framew...
Jungkeun Yoon, Brian D. Noble, Mingyan Liu, Minkyo...
DAC
2010
ACM
15 years 1 months ago
Cyber-physical energy systems: focus on smart buildings
Operating at the intersection of multiple sensing and control systems designed for occupant comfort, performability and operational efficiency, modern buildings represent a protot...
Jan Kleissl, Yuvraj Agarwal