Sciweavers

12183 search results - page 146 / 2437
» Computers under Attacks!
Sort
View
ICON
2007
IEEE
15 years 11 months ago
A Study of the TKIP Cryptographic DoS Attack
—Wireless networks, especially those based on 802.11, have found widespread use in domestic, commercial, educational, military and public-safety environments. The security of the...
Stephen Mark Glass, Vallipuram Muthukkumarasamy
NDSS
1998
IEEE
15 years 9 months ago
Distributed Algorithms for Attack Localization in All-Optical Networks
All-Optical Networks provide ultra-fast data rates, but present a new set of challenges for network security. We present a new algorithm for attack localization in networks. The a...
Ruth Bergman, Muriel Médard, Serena Chan
ACSC
2007
IEEE
15 years 9 months ago
Cross-Layer Verification of Type Flaw Attacks on Security Protocols
Security protocols are often specified at the application layer; however, application layer specifications give little detail regarding message data structures at the presentation...
Benjamin W. Long, Colin J. Fidge, David A. Carring...
161
Voted
CMS
2006
175views Communications» more  CMS 2006»
15 years 6 months ago
Attack Graph Based Evaluation of Network Security
Abstract. The perspective directions in evaluating network security are simulating possible malefactor's actions, building the representation of these actions as attack graphs...
Igor V. Kotenko, Mikhail Stepashkin
DIMVA
2011
14 years 8 months ago
Code Pointer Masking: Hardening Applications against Code Injection Attacks
In this paper we present an efficient countermeasure against code injection attacks. Our countermeasure does not rely on secret values such as stack canaries and protects against a...
Pieter Philippaerts, Yves Younan, Stijn Muylle, Fr...