Sciweavers

1101 search results - page 141 / 221
» On the Security and Vulnerability of PING
Sort
View
MOBISYS
2009
ACM
15 years 10 months ago
Attacks on public WLAN-based positioning systems
In this work, we study the security of public WLAN-based positioning systems. Specifically, we investigate the Skyhook positioning system, available on PCs and used on a number of...
Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Chri...
HICSS
2009
IEEE
95views Biometrics» more  HICSS 2009»
15 years 4 months ago
Intrusion Monitoring in Process Control Systems
To protect process control networks from cyber intrusions, preventive security measures such as perimeter defenses (for example, network firewalls and demilitarized zones) and se...
Alfonso Valdes, Steven Cheung
IEEEARES
2009
IEEE
15 years 4 months ago
A Mobile Ambients-Based Approach for Network Attack Modelling and Simulation
Abstract—Attack Graphs are an important support for assessment and subsequent improvement of network security. They reveal possible paths an attacker can take to break through se...
Virginia N. L. Franqueira, Pascal van Eck, Roel Wi...
IEEEARES
2009
IEEE
15 years 4 months ago
Revealing the Calling History of SIP VoIP Systems by Timing Attacks
Many emergent security threats which did not exist in the traditional telephony network are introduced in SIP VoIP services. To provide high-level security assurance to SIP VoIP s...
Ge Zhang, Simone Fischer-Hübner, Leonardo A. ...
ACNS
2008
Springer
88views Cryptology» more  ACNS 2008»
15 years 4 months ago
On the Effectiveness of Internal Patching Against File-Sharing Worms
File-sharing worms have been terrorizing Peer-to-peer (P2P) systems in recent years. Existing defenses relying on users’ individual recoveries or limiting users’ file-sharing ...
Liang Xie, Hui Song, Sencun Zhu