Sciweavers

12183 search results - page 32 / 2437
» Computers under Attacks!
Sort
View
CCS
2009
ACM
14 years 4 months ago
CoSP: a general framework for computational soundness proofs
We describe CoSP, a general framework for conducting computational soundness proofs of symbolic models and for embedding these proofs into formal calculi. CoSP considers arbitrary...
Michael Backes, Dennis Hofheinz, Dominique Unruh
MOBICOM
2004
ACM
14 years 3 months ago
Denial of service resilience in ad hoc networks
Significant progress has been made towards making ad hoc networks secure and DoS resilient. However, little attention has been focused on quantifying DoS resilience: Do ad hoc ne...
Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly
ICNS
2009
IEEE
14 years 4 months ago
Counter-Flooding: DoS Protection for Public Key Handshakes in LANs
—The majority of security protocols employ public key cryptography for authentication at least in the connection setup phase. However, verifying digital signatures is an expensiv...
Yves Igor Jerschow, Björn Scheuermann, Martin...
ICNS
2007
IEEE
14 years 4 months ago
Data fusion algorithms for network anomaly detection: classification and evaluation
In this paper, the problem of discovering anomalies in a large-scale network based on the data fusion of heterogeneous monitors is considered. We present a classification of anoma...
Vasilis Chatzigiannakis, Georgios Androulidakis, K...
IFSA
2007
Springer
149views Fuzzy Logic» more  IFSA 2007»
14 years 4 months ago
From Interval Computations to Constraint-Related Set Computations: Towards Faster Estimation of Statistics and ODEs Under Interv
One of the important components of granular computing is interval computations. In interval computations, at each intermediate stage of the computation, we have intervals of possi...
Martine Ceberio, Vladik Kreinovich, Andrzej Pownuk...