Sciweavers

3451 search results - page 115 / 691
» Collaborative attack modeling
Sort
View
ACSW
2006
15 years 3 months ago
Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS
Intrusion detection systems (IDS) perform an important role in the provision of network security, providing real- time notification of attacks in progress. One promising category ...
David Duncombe, George M. Mohay, Andrew Clark
IJDSN
2006
136views more  IJDSN 2006»
15 years 2 months ago
Intrusion Detection for Routing Attacks in Sensor Networks
Security is a critical challenge for creating robust and reliable sensor networks. For example, routing attacks have the ability to disconnect a sensor network from its central ba...
Chong Eik Loo, Mun Yong Ng, Christopher Leckie, Ma...
JSAC
2006
106views more  JSAC 2006»
15 years 2 months ago
Study of BGP Peering Session Attacks and Their Impacts on Routing Performance
We present a detailed study of the potential impact of BGP peering session attacks and the resulting exploitation of Route Flap Damping (RFD) that cause network-wide routing disrup...
Kotikalapudi Sriram, Doug Montgomery, Oliver Borch...
TCC
2005
Springer
141views Cryptology» more  TCC 2005»
15 years 7 months ago
Public-Key Steganography with Active Attacks
A complexity-theoretic model for public-key steganography with active attacks is introduced. The notion of steganographic security against adaptive chosen-covertext attacks (SS-CC...
Michael Backes, Christian Cachin
CODAS
1996
157views more  CODAS 1996»
15 years 3 months ago
Flexible Workflow Framework for Supporting Collaborative Works
Database technologies are indispensable for workflow management system, one of the remarkable groupware supporting asynchronous distributed cooperative work. In this paper, a form...
Takeo Kunishima, Kazumasa Yokota