Sciweavers

188 search results - page 5 / 38
» Simulative Evaluation of Security Attacks in Networked Criti...
Sort
View
ACSAC
2009
IEEE
15 years 5 months ago
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs
Abstract—By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective counter...
Kyle Ingols, Matthew Chu, Richard Lippmann, Seth E...
MSWIM
2006
ACM
15 years 4 months ago
An application-driven perspective on wireless sensor network security
Wireless sensor networks (WSNs) have recently attracted a lot of interest due to the range of applications they enable. Unfortunately, WSNs are exposed to numerous security threat...
Eric Sabbah, Adnan Majeed, Kyoung-Don Kang, Ke Liu...
AIMS
2009
Springer
15 years 3 months ago
Evaluation of Sybil Attacks Protection Schemes in KAD
In this paper, we assess the protection mechanisms entered into recent clients to fight against the Sybil attack in KAD, a widely deployed Distributed Hash Table. We study three m...
Thibault Cholez, Isabelle Chrisment, Olivier Festo...
IM
2007
14 years 12 months ago
Interactive Informatics on Internet Infrastructure
— We present the design and evaluation of I4, a network infrastructure that enables information exchange and collaboration among different domains. I4 can help address problems, ...
F. Zhao, V. R. Vemuri, Shyhtsun Felix Wu, F. Xue, ...
CONEXT
2008
ACM
15 years 6 days ago
Distributed detection of large-scale attacks in the internet
Despite the many research activities that are performed in the field of attack prevention, detection, and mitigation, largescale attacks like Distributed Denial-of-Service (DDoS) ...
Thomas Gamer