Sciweavers

2503 search results - page 6 / 501
» Building Computer Network Attacks
Sort
View
HOTOS
1997
IEEE
14 years 1 months ago
Building Diverse Computer Systems
Diversity is an important source of robustness in biological systems. Computers, by contrast, are notable for their lack of diversity. Although homogeneous systems have many advan...
Stephanie Forrest, Anil Somayaji, David H. Ackley
KIVS
2005
Springer
14 years 2 months ago
A Honeypot Architecture for Detecting and Analyzing Unknown Network Attacks
Patrick Diebold, Andreas Hess, Günter Sch&aum...
ETFA
2006
IEEE
14 years 3 months ago
Profinet IO-Device Emulator based on the Man-in-the-middle Attack
A Profinet IO Network of Class A uses standard Ethernet network components. If these network components can be attacked by e.g. a man-in-themiddle attack, this is also the case fo...
Michel Baud, Max Felser