Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
12183
search results - page 104 / 2437
»
Computers under Attacks!
Sort
relevance
views
votes
recent
update
View
thumb
title
88
click to vote
ICPP
2003
IEEE
123
views
Distributed And Parallel Com...
»
more
ICPP 2003
»
Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks
15 years 9 months ago
Download
www.freehaven.net
Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zha...
claim paper
Read More »
72
click to vote
LCN
2000
IEEE
86
views
Computer Networks
»
more
LCN 2000
»
IGMPv3-Based Method for Avoiding DoS Attacks in Multicast-Enabled Networks
15 years 9 months ago
Download
ants.dif.um.es
Antonio F. Gómez-Skarmeta, Angel L. Mateo-M...
claim paper
Read More »
132
click to vote
AINA
2010
IEEE
144
views
Computer Networks
»
more
AINA 2010
»
Mitigating Sandwich Attacks Against a Secure Key Management Scheme in Wireless Sensor Networks for PCS/SCADA
15 years 7 months ago
Download
www.wsn-security.info
Hani Alzaid, DongGook Park, Juan Manuel Gonz&aacut...
claim paper
Read More »
99
click to vote
FOCS
2010
IEEE
186
views
Theoretical Computer Science
»
more
FOCS 2010
»
Cryptography against Continuous Memory Attacks
15 years 2 months ago
Download
eprint.iacr.org
Yevgeniy Dodis, Kristiyan Haralambiev, Adriana L&o...
claim paper
Read More »
165
click to vote
SADFE
2008
IEEE
186
views
Forensic Engineering
»
more
SADFE 2008
»
Exemplifying Attack Identification and Analysis in a Novel Forensically Viable Syslog Model
15 years 11 months ago
Download
digital.cs.usu.edu
This research builds on our method for validating syslog entries proposed in [5]. The goal of the proposed method is to allow syslog files to be forensically viable. The goal with...
Steena Dominica Steven Monteiro, Robert F. Erbache...
claim paper
Read More »
« Prev
« First
page 104 / 2437
Last »
Next »