Sciweavers

286 search results - page 44 / 58
» Analyzing the vulnerability of superpeer networks against at...
Sort
View
SECON
2010
IEEE
13 years 8 months ago
RDAS: Reputation-Based Resilient Data Aggregation in Sensor Network
Data aggregation in wireless sensor networks is vulnerable to security attacks and natural failures. A few nodes can drastically alter the result of the aggregation by reporting er...
Carlos R. Perez-Toro, Rajesh Krishna Panta, Saurab...
WETICE
2003
IEEE
14 years 4 months ago
Practical Anonymity for the Masses with Mix-Networks
Designing mix-networks for low-latency applications that offer acceptable performance and provide good resistance against attacks without introducing too much overhead is very dif...
Marc Rennhard, Bernhard Plattner
CP
2007
Springer
14 years 5 months ago
Answer Set Optimization for and/or Composition of CP-Nets: A Security Scenario
Defence trees and CP-net (ceteris paribus network) are two useful approaches that can be used to help a system administrator to analyze a security scenario and to give him a model ...
Stefano Bistarelli, Pamela Peretti, Irina Trubitsy...
ACSAC
2003
IEEE
14 years 2 months ago
A Stateful Intrusion Detection System for World-Wide Web Servers
Web servers are ubiquitous, remotely accessible, and often misconfigured. In addition, custom web-based applications may introduce vulnerabilities that are overlooked even by the ...
Giovanni Vigna, William K. Robertson, Vishal Kher,...
ACNS
2006
Springer
111views Cryptology» more  ACNS 2006»
14 years 4 months ago
Adaptive Detection of Local Scanners
Network attacks often employ scanning to locate vulnerable hosts and services. Fast and accurate detection of local scanners is key to containing an epidemic in its early stage. Ex...
Ahren Studer, Chenxi Wang