The existing research on security issues in cognitive radio networks mainly focuses on attack and defense in individual network layers. However, the attackers do not necessarily re...
Digital fingerprinting uniquely labels each distributed copy with user's ID and provides a proactive means to track the distribution of multimedia. Multi-user collusion is a ...
A network security simulator becomes more useful for the study on the cyber incidents and their defense mechanisms, as cyber terrors have been increasingly popular. Until now, netw...
Joo Beom Yun, Eung Ki Park, Eul-Gyu Im, Hoh Peter ...
Abstract—Gray hole attacks (a.k.a selective forwarding attacks) are a special case of denial of service (DoS) attack, where a misbehaving mesh router just forwards a subset of th...
Remote code-injection attacks are one of the most frequently used attacking vectors in computer security. To detect and analyze injected code (often called shellcode), some researc...