Sciweavers

5234 search results - page 795 / 1047
» Simulation of Computer Network Attacks
Sort
View
LCN
2003
IEEE
15 years 10 months ago
Performance Model of an Optical Switch using Fiber Delay Lines for Resolving Contentions
The performance of an optical switch that handles contention resolution using a fiber delay line (FDL) is modeled and evaluated. We propose using a simple optical buffer that con...
Ayman G. Fayoumi, Anura P. Jayasumana
NDSS
2009
IEEE
15 years 11 months ago
Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense
Cross-site scripting (or XSS) has been the most dominant class of web vulnerabilities in 2007. The main underlying reason for XSS vulnerabilities is that web markup and client-sid...
Yacin Nadji, Prateek Saxena, Dawn Song
NDSS
2008
IEEE
15 years 11 months ago
Limits of Learning-based Signature Generation with Adversaries
Automatic signature generation is necessary because there may often be little time between the discovery of a vulnerability, and exploits developed to target the vulnerability. Mu...
Shobha Venkataraman, Avrim Blum, Dawn Song
NDSS
2006
IEEE
15 years 10 months ago
Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather tha...
Keith B. Frikken, Jiangtao Li, Mikhail J. Atallah
NDSS
2006
IEEE
15 years 10 months ago
Software Self-Healing Using Collaborative Application Communities
Software monocultures are usually considered dangerous because their size and uniformity represent the potential for costly and widespread damage. The emerging concept of collabor...
Michael E. Locasto, Stelios Sidiroglou, Angelos D....