Sciweavers

5234 search results - page 722 / 1047
» Simulation of Computer Network Attacks
Sort
View
138
Voted
MSWIM
2006
ACM
15 years 11 months ago
Multicast in 802.11 WLANs: an experimental study
While the deployment of WiFi networks continue to grow at an explosive rate, the multicast multimedia delivery service on WiFi compliant devices is still in its early stage of dev...
Diego Dujovne, Thierry Turletti
PERCOM
2007
ACM
15 years 11 months ago
Sensor Web Design Studies for Realtime Dynamic Congestion Pricing
Traffic Congestion is a multi-billion dollar national problem and worsening every year with population growth and increase in freight traffic. We present a model for realistic s...
Milton Halem, Anand Patwardhan, Sandor Dornbush, M...
MOBISYS
2009
ACM
16 years 5 months ago
SPATE: small-group PKI-less authenticated trust establishment
Establishing trust between a group of individuals remains a difficult problem. Prior works assume trusted infrastructure, require an individual to trust unknown entities, or provi...
Yue-Hsun Lin, Ahren Studer, Hsu-Chun Hsiao, Jonath...
SIGCOMM
2009
ACM
15 years 11 months ago
Impact of IT monoculture on behavioral end host intrusion detection
In this paper, we study the impact of today’s IT policies, defined based upon a monoculture approach, on the performance of endhost anomaly detectors. This approach leads to th...
Dhiman Barman, Jaideep Chandrashekar, Nina Taft, M...
125
Voted
IPPS
2006
IEEE
15 years 11 months ago
A case for exploit-robust and attack-aware protocol RFCs
A large number of vulnerabilities occur because protocol implementations failed to anticipate illegal packets. rfcs typically define what constitute “right” packets relevant ...
Venkat Pothamsetty, Prabhaker Mateti