Sciweavers

12183 search results - page 166 / 2437
» Computers under Attacks!
Sort
View
AINA
2006
IEEE
15 years 8 months ago
EC: an edge-based architecture against DDoS attacks and malware spread
The ability to limit unsolicited traffic in the Internet is important to defy DDoS attacks and to contain the spread of worms and viruses. The concept of capabilities, which requir...
Roger Karrer
149
Voted
EUC
2005
Springer
15 years 10 months ago
Anonymous Routing in Wireless Mobile Ad Hoc Networks to Prevent Location Disclosure Attacks
Wireless Ad Hoc networks are particularly vulnerable due to their fundamental characteristics such as an open medium, dynamic topology, distributed cooperation and constrained capa...
Arjan Durresi, Vamsi Paruchuri, Mimoza Durresi, Le...
137
Voted
RAID
1999
Springer
15 years 9 months ago
Improving Intrusion Detection Performance using Keyword Selection and Neural Networks
The most common computer intrusion detection systems detect signatures of known attacks by searching for attack-specific keywords in network traffic. Many of these systems suffer ...
Richard Lippmann, Robert K. Cunningham
FC
2010
Springer
260views Cryptology» more  FC 2010»
15 years 6 months ago
Lightweight Cryptography and DPA Countermeasures: A Survey
Abstract. The dawning Ubiquitous Computing age demands a new attacker model for the myriads of pervasive computing devices used: since a potentially malicious user is in full contr...
Amir Moradi, Axel Poschmann
142
Voted
ICPR
2004
IEEE
16 years 6 months ago
Photometric Stereo Under Blurred Observations
In this paper we address the problem of simultaneous estimation of structure and restoration of images from blurred photometric measurements. Given the blurred observations of a s...
Manjunath V. Joshi, Subhasis Chaudhuri