Sciweavers

268 search results - page 38 / 54
» A Statistical Attack on RC6
Sort
View
ICC
2009
IEEE
132views Communications» more  ICC 2009»
14 years 2 months ago
Preprocessing DNS Log Data for Effective Data Mining
—The Domain Name Service (DNS) provides a critical function in directing Internet traffic. Defending DNS servers from bandwidth attacks is assisted by the ability to effectively...
Mark E. Snyder, Ravi Sundaram, Mayur Thakur
AINA
2007
IEEE
14 years 1 months ago
QoS-LI: QoS Loss Inference in Disadvantaged Networks
— Quality of Service (QoS) of disadvantaged networks is usually considered from a purely network standpoint in existing works. Adversarial intervention in such networks is not an...
Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya,...
OTM
2007
Springer
14 years 1 months ago
Toward Sound-Assisted Intrusion Detection Systems
Network intrusion detection has been generally dealt with using sophisticated software and statistical analysis, although sometimes it has to be done by administrators, either by d...
Lei Qi, Miguel Vargas Martin, Bill Kapralos, Mark ...
RAID
2007
Springer
14 years 1 months ago
Emulation-Based Detection of Non-self-contained Polymorphic Shellcode
Network-level emulation has recently been proposed as a method for the accurate detection of previously unknown polymorphic code injection attacks. In this paper, we extend network...
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...
ICMCS
2006
IEEE
118views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Spread-Spectrum Substitution watermarking Game
In the integrity checking context of multimedia contents, a malicious user aims at devising a forged content in order to fool a watermarker by making him use as a genuine content....
Jean-Philippe Boyer, Pierre Duhamel, Jacques Blanc...