Sciweavers

2503 search results - page 9 / 501
» Building Computer Network Attacks
Sort
View
WISEC
2009
ACM
14 years 3 months ago
Practical attacks against WEP and WPA
Erik Tews, Martin Beck
P2P
2007
IEEE
104views Communications» more  P2P 2007»
14 years 3 months ago
How stable are large superpeer networks against attack?
In this paper, we analyze the stability of large scale superpeer networks against attacks. Two different kinds of attacks namely deterministic and degree dependent attack have bee...
Bivas Mitra, Sujoy Ghose, Niloy Ganguly
ICNS
2007
IEEE
14 years 3 months ago
Building IP networks using Advanced Telecom Computing Architecture
The second generation of Advanced Telecom Computing Architecture (ATCA) based on PCI Industrial Computer Manufacturers Group (PICMG) specification has evolved to a live deployment...
Dharmaraja Rajan
WIMOB
2008
IEEE
14 years 3 months ago
Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side
Abstract—One of the reasons that the research of intrusion detection in wireless sensor networks has not advanced significantly is that the concept of “intrusion” is not cle...
Ioannis Krontiris, Thanassis Giannetsos, Tassos Di...
ICDCSW
2002
IEEE
14 years 1 months ago
A Collaborative Infrastructure for Scalable and Robust News Delivery
In this paper we describe the model used for the NewsWire collaborative content delivery system. The system builds on the robustness and scalability of Astrolabe to weave a peer-t...
Werner Vogels, Christopher Ré, Robbert van ...