Sciweavers

72 search results - page 4 / 15
» Teaching Network Security With IP Darkspace Data
Sort
View
ICC
2009
IEEE
118views Communications» more  ICC 2009»
16 years 3 days ago
A First Order Logic Security Verification Model for SIP
: It is well known that no security mechanism can provide full protection against a potential attack. There is always a possibility that a security incident may happen, mainly as a...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...
187
Voted
CCS
2008
ACM
15 years 7 months ago
The risk-utility tradeoff for IP address truncation
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...
JDFP
2008
81views more  JDFP 2008»
15 years 5 months ago
On Teaching TCP/IP Protocol Analysis to Computer Forensics Examiners
Digital investigators have an increasing need to examine data network logs and traffic, either as part of criminal or civil investigations or when responding to information securi...
Gary C. Kessler
ISJGP
2007
146views more  ISJGP 2007»
15 years 5 months ago
End-to-End Security Across Wired-Wireless Networks for Mobile Users
Abstract  Recent advances in mobile computing and wireless communication technologies are enabling high mobility and flexibility of anytime, anywhere service access for mobile us...
Sherali Zeadally, Nicolas Sklavos, Moganakrishnan ...
162
Voted
EUROSEC
2008
ACM
15 years 7 months ago
Logging based IP Traceback in switched ethernets
IP Traceback systems facilitate tracing of IP packets back to their origin, despite possibly forged or overwritten source address data. A common shortcoming of existing proposals ...
Marios S. Andreou, Aad P. A. van Moorsel