Sciweavers

507 search results - page 79 / 102
» Attacking DDoS at the Source
Sort
View
144
Voted
CCS
2006
ACM
15 years 7 months ago
Measuring denial Of service
Denial-of-service (DoS) attacks significantly degrade service quality experienced by legitimate users by introducing long delays, excessive losses, and service interruptions. The ...
Jelena Mirkovic, Peter L. Reiher, Sonia Fahmy, Ros...
119
Voted
ACSAC
2010
IEEE
15 years 1 months ago
Exploiting smart-phone USB connectivity for fun and profit
The Universal Serial Bus (USB) connection has become the de-facto standard for both charging and data transfers for smart phone devices including Google's Android and Apple&#...
Zhaohui Wang, Angelos Stavrou
127
Voted
TWC
2010
14 years 10 months ago
Pi: a practical incentive protocol for delay tolerant networks
Delay Tolerant Networks (DTNs) are a class of networks characterized by lack of guaranteed connectivity, typically low frequency of encounters between DTN nodes and long propagatio...
Rongxing Lu, Xiaodong Lin, Haojin Zhu, Xuemin Shen...
TLDI
2009
ACM
108views Formal Methods» more  TLDI 2009»
16 years 11 days ago
Secure compilation of a multi-tier web language
Storing state in the client tier (in forms or cookies, for example) improves the efficiency of a web application, but it also renders the secrecy and integrity of stored data vul...
Ioannis G. Baltopoulos, Andrew D. Gordon
115
Voted
HICSS
2002
IEEE
116views Biometrics» more  HICSS 2002»
15 years 8 months ago
E-commerce Security Issues
Without trust, most prudent business operators and clients may decide to forgo use of the Internet and revert back to traditional methods of doing business. To counter this trend,...
Randy C. Marchany, Joseph G. Tront