Sciweavers

1123 search results - page 73 / 225
» Network Protocol System Fingerprinting - A Formal Approach
Sort
View
GLOBECOM
2008
IEEE
15 years 6 months ago
Jamming ACK Attack to Wireless Networks and a Mitigation Approach
— In many Medium Access Control (MAC) schemes for wireless networks, an Acknowledgment (ACK) packet is transmitted from the data receiver to the data sender to announce the succe...
Zhiguo Zhang, Jingqi Wu, Jing Deng, Meikang Qiu
COMCOM
2002
189views more  COMCOM 2002»
14 years 11 months ago
Intrusion detection techniques and approaches
Recent security incidents and analysis have demonstrated that manual response to such attacks is no longer feasible. Intrusion Detection systems offer techniques for modelling and...
Theuns Verwoerd, Ray Hunt
ICCS
1997
Springer
15 years 4 months ago
Applying Conceptual Graph Theory to the User-Driven Specification of Network Information Systems
Users need to be strongly involved in the specification process of network information systems. Characteristics of user-driven specification are described, and process composition ...
Aldo de Moor
SPW
2000
Springer
15 years 3 months ago
Users and Trust in Cyberspace
The underlying belief and knowledge models assumed by various kinds of authentication protocols have been studied for well over 10 years now. On the other hand, the related questio...
Pekka Nikander, Kristiina Karvonen
SIGMOBILE
2010
147views more  SIGMOBILE 2010»
14 years 6 months ago
TCPSpeaker: clean and dirty sides of the same slate
As new approaches toward clean-slate network transport continue to emerge in the wireless domain and beyond, so grows the difficulty of conducting reproducible, head-to-head evalu...
Dan Levin, Harald Schiöberg, Ruben Merz, Cigd...