Sciweavers

12183 search results - page 164 / 2437
» Computers under Attacks!
Sort
View
124
Voted
DRM
2005
Springer
15 years 10 months ago
Hybrid static-dynamic attacks against software protection mechanisms
Advances in reverse engineering and program analyses have made software extremely vulnerable to malicious host attacks. These attacks typically take the form of intellectual prope...
Matias Madou, Bertrand Anckaert, Bjorn De Sutter, ...
148
Voted
RTA
2009
Springer
15 years 11 months ago
Loops under Strategies
Most techniques to automatically disprove termination of term rewrite systems search for a loop. Whereas a loop implies nontermination for full rewriting, this is not necessarily t...
René Thiemann, Christian Sternagel
LCN
2000
IEEE
15 years 9 months ago
The Performance of Ethernet under a Combined Data/Real-Time Traffic
In this paper, we investigate the performance of an IEEE802.3 shared-bandwidth hub under a mixed data/real-time traffic load. For the regular data nodes we assume an exponentially...
Mokhtar Aboelaze, Ayman Elnaggar
150
Voted
ACSAC
1999
IEEE
15 years 9 months ago
Safe Areas of Computation for Secure Computing with Insecure Applications
Currently the computer systems and software used by the average user offer virtually no security. Because of this many attacks, both simulated and real, have been described by the...
André L. M. dos Santos, Richard A. Kemmerer
WISEC
2009
ACM
15 years 11 months ago
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks
Recent studies show that network coding can provide significant benefits to network protocols, such as increased throughput, reduced network congestion, higher reliability, and ...
Jing Dong, Reza Curtmola, Cristina Nita-Rotaru