Sciweavers

162 search results - page 2 / 33
» Topological analysis of network attack vulnerability
Sort
View
61
Voted
INFOCOM
2008
IEEE
15 years 6 months ago
Vulnerability of Network Traffic under Node Capture Attacks Using Circuit Theoretic Analysis
Patrick Tague, David Slater, Jason Rogers, Radha P...
56
Voted
INFOCOM
2006
IEEE
15 years 5 months ago
A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks
Yan Lindsay Sun, Zhu Han, Wei Yu, K. J. Ray Liu
99
Voted
CIS
2008
Springer
15 years 1 months ago
A Near-Optimal Redundancy Allocation Strategy that Minimizes a System's Vulnerability to Hazardous Events and Malicious Attacks
Delivering continuous services in information infrastructures is a major challenge. For system or network administrators, redundancy allocation is one of the best strategies to en...
Frank Yeong-Sung Lin, Po-Hao Tsang, Kun-Dao Jiang
100
Voted
WICON
2008
15 years 1 months ago
Denial of service vulnerabilities in the 802.16 protocol
This paper examines the denial of service attacks that an 802.16 Broadband Wireless Access network is susceptible to at the physical and medium access control layers. In our threa...
Siddharth Maru, Timothy X. Brown
CORR
2010
Springer
106views Education» more  CORR 2010»
14 years 10 months ago
Simulation of Computer Network Attacks
In this work we present a prototype for simulating computer network attacks. Our objective is to simulate large networks (thousands of hosts, with applications and vulnerabilities)...
Carlos Sarraute, Fernando Miranda, José Ign...