Sciweavers

12183 search results - page 122 / 2437
» Computers under Attacks!
Sort
View
APNOMS
2006
Springer
15 years 8 months ago
IP Traceback Algorithm for DoS/DDoS Attack
Abstract. DoS(Denial of Service) / DDoS(Distributed Denial of Service) attacks threaten Internet security nowadays. However, the current Internet protocol and backbone network do n...
Hong-bin Yim, Jae-il Jung
DBSEC
2008
136views Database» more  DBSEC 2008»
15 years 6 months ago
An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems
Pervasive computing applications typically involve cooperation among a number of entities spanning multiple organizations. Any security breach in any single entity can have very fa...
Indrajit Ray, Nayot Poolsappasit, Rinku Dewri
PERCOM
2006
ACM
16 years 4 months ago
Is Your Cat Infected with a Computer Virus?
RFID systems as a whole are often treated with suspicion, but the input data received from individual RFID tags is implicitly trusted. RFID attacks are currently conceived as prop...
Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenb...
ISI
2008
Springer
15 years 4 months ago
Intrusion activity projection for cyber situational awareness
Previous works in the area of network security have emphasized the creation of Intrusion Detection Systems (IDSs) to flag malicious network traffic and computer usage. Raw IDS data...
S. J. Yang, S. Byers, J. Holsopple, B. Argauer, D....
IJNSEC
2007
126views more  IJNSEC 2007»
15 years 4 months ago
Elliptic Curve Cryptography Based Wireless Authentication Protocol
Recently, Aydos et al. proposed an ECC-based wireless authentication protocol. Because their protocol is based on ECC, the protocol has significant advantage including lower comp...
Yongliang Liu, Wen Gao, Hongxun Yao, Xinghua Yu