Sciweavers

3451 search results - page 79 / 691
» Collaborative attack modeling
Sort
View
MOBIHOC
2005
ACM
14 years 8 months ago
The feasibility of launching and detecting jamming attacks in wireless networks
Wireless networks are built upon a shared medium that makes it easy for adversaries to launch jamming-style attacks. These attacks can be easily accomplished by an adversary emitt...
Wenyuan Xu, Wade Trappe, Yanyong Zhang, Timothy Wo...
SIGCOMM
2003
ACM
14 years 2 months ago
A framework for classifying denial of service attacks
Launching a denial of service (DoS) attack is trivial, but detection and response is a painfully slow and often a manual process. Automatic classification of attacks as single- o...
Alefiya Hussain, John S. Heidemann, Christos Papad...
HICSS
2006
IEEE
112views Biometrics» more  HICSS 2006»
14 years 3 months ago
Tool Support for the Collaborative Design of Reference Models - A Business Engineering Perspective
The central idea in reference modeling is the reutilization of the business knowledge contained in reference models for the construction of specific information models. The orient...
Oliver Thomas, August-Wilhelm Scheer
INFOCOM
2003
IEEE
14 years 2 months ago
Static and Dynamic Analysis of the Internet's Susceptibility to Faults and Attacks
— We analyze the susceptibility of the Internet to random faults, malicious attacks, and mixtures of faults and attacks. We analyze actual Internet data, as well as simulated dat...
Seung-Taek Park, Alexy Khrabrov, David M. Pennock,...
ICIP
1999
IEEE
14 years 1 months ago
Power Spectrum Condition for Energy-Efficient Watermarking
This paper presents a model for watermarking and some attacks on watermarks. Given the watermarked signal, the so-called Wiener attack performs minimum mean-squared error (MMSE) es...
Jonathan K. Su, Bernd Girod