Sciweavers

162 search results - page 2 / 33
» Topological analysis of network attack vulnerability
Sort
View
49
Voted
INFOCOM
2006
IEEE
15 years 3 months ago
A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks
Yan Lindsay Sun, Zhu Han, Wei Yu, K. J. Ray Liu
CIS
2008
Springer
14 years 11 months ago
A Near-Optimal Redundancy Allocation Strategy that Minimizes a System's Vulnerability to Hazardous Events and Malicious Attacks
Delivering continuous services in information infrastructures is a major challenge. For system or network administrators, redundancy allocation is one of the best strategies to en...
Frank Yeong-Sung Lin, Po-Hao Tsang, Kun-Dao Jiang
90
Voted
WICON
2008
14 years 11 months ago
Denial of service vulnerabilities in the 802.16 protocol
This paper examines the denial of service attacks that an 802.16 Broadband Wireless Access network is susceptible to at the physical and medium access control layers. In our threa...
Siddharth Maru, Timothy X. Brown
CORR
2010
Springer
106views Education» more  CORR 2010»
14 years 8 months ago
Simulation of Computer Network Attacks
In this work we present a prototype for simulating computer network attacks. Our objective is to simulate large networks (thousands of hosts, with applications and vulnerabilities)...
Carlos Sarraute, Fernando Miranda, José Ign...