Sciweavers

1101 search results - page 61 / 221
» On the Security and Vulnerability of PING
Sort
View
CSREASAM
2006
14 years 11 months ago
Developing Dual-Surveillance Based Vehicle Security Management with Generalized Honeycomb Tori
After the 9/11 event, terrorist attacks related to vehicles cannot be overlooked. In some critical areas, security should be concerned from the context of streets or vehicle moveme...
Li-Yen Hsu, Shin-Shin Kao
COMCOM
2006
111views more  COMCOM 2006»
14 years 9 months ago
SCON: Secure management of continuity in sensor networks
Due to limited energy capacity of batteries, the function lifetime of sensor networks in general is longer than the operational lifetime of single nodes. Therefore, to keep the ne...
Arjan Durresi, Vijay Bulusu, Vamsi Paruchuri
ICICS
2009
Springer
15 years 4 months ago
Assessing Security Risk to a Network Using a Statistical Model of Attacker Community Competence
We propose a novel approach for statistical risk modeling of network attacks that lets an operator perform risk analysis using a data model and an impact model on top of an attack ...
Tomas Olsson
WCRE
2005
IEEE
15 years 3 months ago
Enhancing Security Using Legality Assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Lei Wang, James R. Cordy, Thomas R. Dean
PDCN
2004
14 years 11 months ago
Implementing a secure setuid program
Setuid programs are often exploited by malicious attackers to obtain unauthorized access to local systems. Setuid programs, especially owned by the root user, are granted root pri...
Takahiro Shinagawa, Kenji Kono