Sciweavers

1342 search results - page 26 / 269
» Attacks are Protocols Too
Sort
View
COMPSEC
2006
56views more  COMPSEC 2006»
13 years 7 months ago
A new protocol to counter online dictionary attacks
Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith A...
JISE
2006
37views more  JISE 2006»
13 years 7 months ago
Secure Authentication Protocols Resistant to Guessing Attacks
Jia-Ning Luo, Shiuh-Pyng Shieh, Ji-Chiang Shen
ICNS
2007
IEEE
14 years 1 months ago
A Detection and Offense Mechanism to Defend Against Application Layer DDoS Attacks
—Application layer DDoS attacks, which are legitimate in packets and protocols, gradually become a pressing problem for commerce, politics and military. We build an attack model ...
Jie Yu, Zhoujun Li, Huowang Chen, Xiaoming Chen
LCN
2005
IEEE
14 years 1 months ago
A Novel Tuneable Low-Intensity Adversarial Attack
— Currently, Denial of Service (DoS) attacks remain amongst the most critical threats to Internet applications. The goal of the attacker in a DoS attack is to overwhelm a shared ...
Salil S. Kanhere, Anjum Naveed