Sciweavers

642 search results - page 11 / 129
» Detecting Spoofed Packets
Sort
View
ICISS
2007
Springer
15 years 3 months ago
A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks
Phishing attack is a kind of identity theft trying to steal confidential data. Existing approaches against phishing attacks cannot prevent real-time phishing attacks. This paper pr...
Mohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mo...
CSREASAM
2006
15 years 1 months ago
Custom Plugin - A Solution to Phishing and Pharming Attacks
- This paper proposes a new method to detect, alert and protect the user from Internationalized Domain Names [1] (IDN) and Uniform Resource Locator (URL) spoofing, phishing, pharmi...
Omer Mahmood
INFOCOM
2003
IEEE
15 years 5 months ago
Detecting Network Intrusions via Sampling: A Game Theoretic Approach
In this paper, we consider the problem of detecting an intruding packet in a communication network. Detection is accomplished by sampling a portion of the packets transiting selec...
Murali S. Kodialam, T. V. Lakshman
INFOCOM
2005
IEEE
15 years 5 months ago
Bayesian packet loss detection for TCP
— One of TCP’s critical tasks is to determine which packets are lost in the network, as a basis for control actions (flow control and packet retransmission). Modern TCP implem...
Nahur Fonseca, Mark Crovella
ICC
2007
IEEE
154views Communications» more  ICC 2007»
15 years 6 months ago
Error Prediction Based Redundancy Control for Robust Transmission of Video Over Wireless Links
—The loss of UDP/IP packets has a high impact on the quality of the low-rate video streaming, since one UDP/IP packet typically represents a considerable part of a picture, which...
Olivia Nemethova, Wolfgang Karner, Markus Rupp