Sciweavers

6907 search results - page 1142 / 1382
» Securing distributed adaptation
Sort
View
BROADNETS
2006
IEEE
15 years 5 months ago
Toward a More Practical Marking Scheme for IP Traceback
Probabilistic packet marking (PPM) has been studied as a promising approach to realize IP traceback. In this paper, we propose a new PPM approach that improves the current state o...
Chao Gong, Kamil Saraç
COMSWARE
2006
IEEE
15 years 5 months ago
Comparing lexical analysis tools for buffer overflow detection in network software
Many of the bugs in distributed software modules are security vulnerabilities, the most common and also the most exploited of which are buffer overflows and they typically arise in...
Davide Pozza, Riccardo Sisto, Luca Durante, Adrian...
DSD
2006
IEEE
113views Hardware» more  DSD 2006»
15 years 5 months ago
Lifetime Analysis in Heterogeneous Sensor Networks
Wireless sensor networks (WSN) are composed of battery-driven communication entities performing multiple, usually different tasks. In order to complete a given task, all sensor no...
Falko Dressler, Isabel Dietrich
89
Voted
GLOBECOM
2006
IEEE
15 years 5 months ago
RIM: Router Interface Marking for IP Traceback
—Distributed Denial-of-Service (DDoS) attacks have become a major threat to the Internet. As a countermeasure against DDoS attacks, IP traceback schemes identify the network path...
Ruiliang Chen, Jung Min Park, Randolph Marchany
100
Voted
ICMCS
2006
IEEE
147views Multimedia» more  ICMCS 2006»
15 years 5 months ago
A Secret Key Based Multiscale Fragile Watermark in the Wavelet Domain
The distribution of the wavelet coefficients in 2-D discrete wavelet transform (DWT) subspaces can be well described by a Gaussian mixture statistical model. In this paper, a secr...
Hua Yuan, Xiao-Ping Zhang
« Prev « First page 1142 / 1382 Last » Next »