Sciweavers

284 search results - page 17 / 57
» Cyber attack modeling and simulation for network security an...
Sort
View
MOBIQUITOUS
2008
IEEE
14 years 2 months ago
Modeling of the channel-hopping anti-jamming defense in multi-radio wireless networks
Multi-radio (multi-interface, multi-channel) 802.11 and sensor networks have been proposed to increase network capacity and to reduce energy consumption, to name only a few of the...
Sherif M. Khattab, Daniel Mossé, Rami G. Me...
CSFW
2012
IEEE
11 years 10 months ago
Discovering Concrete Attacks on Website Authorization by Formal Analysis
—Social sign-on and social sharing are becoming an ever more popular feature of web applications. This success is largely due to the APIs and support offered by prominent social ...
Chetan Bansal, Karthikeyan Bhargavan, Sergio Maffe...
WWW
2008
ACM
14 years 8 months ago
Secure or insure?: a game-theoretic analysis of information security games
Despite general awareness of the importance of keeping one's system secure, and widespread availability of consumer security technologies, actual investment in security remai...
Jens Grossklags, Nicolas Christin, John Chuang
ACSAC
2002
IEEE
14 years 22 days ago
Representing TCP/IP Connectivity For Topological Analysis of Network Security
The individual vulnerabilities of hosts on a network can be combined by an attacker to gain access that would not be possible if the hosts were not interconnected. Currently avail...
Ronald W. Ritchey, Brian O'Berry, Steven Noel
ACSAC
2002
IEEE
14 years 22 days ago
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks
The threat to organisations from network attacks is very real. Current countermeasures to denial of service (DoS) attacks rely on the perimeter model of network security. However,...
John Haggerty, Qi Shi, Madjid Merabti