Sciweavers

1019 search results - page 191 / 204
» Cryptographic Design Vulnerabilities
Sort
View
IADIS
2004
14 years 11 months ago
End to End Defence Against DDoS Atacks
Denial of Service (DoS) attacks and Distributed Denial of Service (DDoS) attacks accounted for more losses than Internet financial fraud and viruses combined (CSI/FBI 2003). The I...
Anastasia Gemona, Ishbel Duncan, Colin Allison, Al...
AUSFORENSICS
2003
14 years 10 months ago
Computer Forensics in the Global Enterprise
The increase in cyber-crime has created the need for security technologies that are always one step ahead of the criminal. Computer forensics and incident response solutions allow...
Melisa Bleasdale, Scott Mann, John Patzakis
USS
2004
14 years 10 months ago
TIED, LibsafePlus: Tools for Runtime Buffer Overflow Protection
Buffer overflow exploits make use of the treatment of strings in C as character arrays rather than as first-class objects. Manipulation of arrays as pointers and primitive pointer...
Kumar Avijit, Prateek Gupta, Deepak Gupta
BMCBI
2010
179views more  BMCBI 2010»
14 years 9 months ago
A semi-supervised learning approach to predict synthetic genetic interactions by combining functional and topological properties
Background: Genetic interaction profiles are highly informative and helpful for understanding the functional linkages between genes, and therefore have been extensively exploited ...
Zhuhong You, Zheng Yin, Kyungsook Han, De-Shuang H...
COMCOM
2008
145views more  COMCOM 2008»
14 years 9 months ago
A game-theoretic intrusion detection model for mobile ad hoc networks
In this paper, we address the problem of increasing the effectiveness of an intrusion detection system (IDS) for a cluster of nodes in ad hoc networks. To reduce the performance o...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...