Sciweavers

1101 search results - page 26 / 221
» On the Security and Vulnerability of PING
Sort
View
ICCCN
1998
IEEE
15 years 1 months ago
On the Vulnerabilities and Protection of OSPF Routing Protocol
This paper analyzes both the strong points and weak points of OSPF routing protocol from security perspective. On its strong points, we abstract its features of information least ...
Feiyi Wang, Shyhtsun Felix Wu
ESORICS
2010
Springer
14 years 10 months ago
k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks
The security risk of a network against unknown zero day attacks has been considered as something unmeasurable since software flaws are less predictable than hardware faults and the...
Lingyu Wang, Sushil Jajodia, Anoop Singhal, Steven...
EUROSYS
2010
ACM
15 years 2 months ago
Residue objects: a challenge to web browser security
A complex software system typically has a large number of objects in the memory, holding references to each other to implement an object model. Deciding when the objects should be...
Shuo Chen, Hong Chen, Manuel Caballero
COMCOM
2007
106views more  COMCOM 2007»
14 years 9 months ago
An ontology description for SIP security flaws
— Voice over IP (VoIP) services based on the Session Initiation Protocol (SIP) gain ground as compared to other protocols like MGCP or H.323. However, the open SIP architecture c...
Dimitris Geneiatakis, Costas Lambrinoudakis
ICDCIT
2004
Springer
15 years 3 months ago
Vulnerabilities and Threats in Distributed Systems
We discuss research issues and models for vulnerabilities and threats in distributed computing systems. We present four diverse approaches to reducing system vulnerabilities and th...
Bharat K. Bhargava, Leszek Lilien