Sciweavers

1486 search results - page 32 / 298
» Firewall Rules Analysis
Sort
View
AIM
2002
14 years 11 months ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe
USS
2010
14 years 9 months ago
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking
Idle port scanning uses side-channel attacks to bounce scans off of a "zombie" host to stealthily scan a victim IP address and determine if a port is open or closed, or ...
Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidia...
MOC
1998
64views more  MOC 1998»
14 years 11 months ago
Trapezoidal and midpoint splittings for initial-boundary value problems
In this paper we consider various multi-component splittings based on the trapezoidal rule and the implicit midpoint rule. It will be shown that an important requirement on such me...
Willem Hundsdorfer
CCS
2007
ACM
15 years 6 months ago
ConceptDoppler: a weather tracker for internet censorship
The text of this paper has passed across many Internet routers on its way to the reader, but some routers will not pass it along unfettered because of censored words it contains. ...
Jedidiah R. Crandall, Daniel Zinn, Michael Byrd, E...
SIGECOM
2000
ACM
132views ECommerce» more  SIGECOM 2000»
15 years 4 months ago
What is actually taking place on web sites: e-commerce lessons from web server logs
A prime business concern is knowing your customer. One legacy carried into the present from the earliest NCSA web servers is web server logs. While there are more powerful user tr...
Mark Rosenstein