Sciweavers

1101 search results - page 14 / 221
» On the Security and Vulnerability of PING
Sort
View
ACMSE
2006
ACM
15 years 3 months ago
Static analysis of anomalies and security vulnerabilities in executable files
Software researchers have already developed static code security checkers to parse through and scan source code files, looking for security vulnerabilities [8, 9]. What about exec...
Jay-Evan J. Tevis, John A. Hamilton Jr.
DRM
2003
Springer
15 years 2 months ago
Analysis of security vulnerabilities in the movie production and distribution process
Unauthorized copying of movies is a major concern for the motion picture industry. While unauthorized copies of movies have been distributed via portable physical media for some t...
Simon Byers, Lorrie Faith Cranor, David P. Kormann...
GLOBECOM
2006
IEEE
15 years 3 months ago
Security Vulnerabilities in Channel Assignment of Multi-Radio Multi-Channel Wireless Mesh Networks
— In order to fully exploit the aggregate bandwidth available in the radio spectrum, future Wireless Mesh Networks (WMN) are expected to take advantage of multiple orthogonal cha...
Anjum Naveed, Salil S. Kanhere
WICON
2008
14 years 11 months ago
Security vulnerabilities in IEEE 802.22
Cognitive Radio (CR) is seen as one of the enabling technologies for realizing a new spectrum access paradigm, viz. Opportunistic Spectrum Sharing (OSS). IEEE 802.22 is the world&...
Kaigui Bian, Jung Min Park
ACSAC
2004
IEEE
15 years 1 months ago
Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis
1 A number of recent applications have been built on distributed hash tables (DHTs) based overlay networks. Almost all DHT-based schemes employ a tight deterministic data placement...
Mudhakar Srivatsa, Ling Liu