Sciweavers

1278 search results - page 58 / 256
» Attack Graph Based Evaluation of Network Security
Sort
View
ICIP
2009
IEEE
16 years 5 months ago
Security Evaluation Of Informed Watermarking Schemes
In this paper, security evaluation of an important watermarking class based on quantization is given. Theoretical developments and practical simulations are used to measure the se...
EDBT
2009
ACM
241views Database» more  EDBT 2009»
15 years 11 months ago
GADDI: distance index based subgraph matching in biological networks
Currently, a huge amount of biological data can be naturally represented by graphs, e.g., protein interaction networks, gene regulatory networks, etc. The need for indexing large ...
Shijie Zhang, Shirong Li, Jiong Yang
ISI
2007
Springer
15 years 10 months ago
Managing Security Threats and Vulnerabilities for Small to Medium Enterprises
– The difficulty in managing security threats and vulnerabilities for small and medium-sized enterprises (SME) is investigated. A detailed conceptual framework for asset and thre...
Cyril Onwubiko, Andrew P. Lenaghan
ICC
2009
IEEE
153views Communications» more  ICC 2009»
15 years 11 months ago
Detecting Malicious Packet Dropping in the Presence of Collisions and Channel Errors in Wireless Ad Hoc Networks
—Detecting malicious packet dropping is important in ad hoc networks to combat a variety of security attacks such as blackhole, greyhole, and wormhole attacks. We consider the de...
Thaier Hayajneh, Prashant Krishnamurthy, David Tip...
ICON
2007
IEEE
15 years 10 months ago
Lightweight Detection of DoS Attacks
Denial of Service (DoS) attacks have continued to evolve and they impact the availability of Internet infrastructure. Many researchers in the field of network security and system ...
Sirikarn Pukkawanna, Vasaka Visoottiviseth, Panita...