Sciweavers

12183 search results - page 104 / 2437
» Computers under Attacks!
Sort
View
LCN
2000
IEEE
15 years 9 months ago
IGMPv3-Based Method for Avoiding DoS Attacks in Multicast-Enabled Networks
Antonio F. Gómez-Skarmeta, Angel L. Mateo-M...
FOCS
2010
IEEE
15 years 2 months ago
Cryptography against Continuous Memory Attacks
Yevgeniy Dodis, Kristiyan Haralambiev, Adriana L&o...
SADFE
2008
IEEE
15 years 11 months ago
Exemplifying Attack Identification and Analysis in a Novel Forensically Viable Syslog Model
This research builds on our method for validating syslog entries proposed in [5]. The goal of the proposed method is to allow syslog files to be forensically viable. The goal with...
Steena Dominica Steven Monteiro, Robert F. Erbache...