Sciweavers

143 search results - page 21 / 29
» Defending against eclipse attacks on overlay networks
Sort
View
PERCOM
2007
ACM
14 years 8 months ago
Distributed, Uncertainty-Aware Access Control for Pervasive Computing
Access control to sensitive resources in pervasive computing needs to take uncertainty into account. Previous research has developed uncertainty-aware access-control models for en...
Urs Hengartner, Ge Zhong
WSC
2004
13 years 10 months ago
Evaluation of Secure Peer-to-Peer Overlay Routing for Survivable SCADA Systems
Supervisory Control And Data Acquisition (SCADA) systems gather and analyze data for real-time control. SCADA systems are used extensively, in applications such as electrical powe...
Jeffrey J. Farris, David M. Nicol
GLOBECOM
2007
IEEE
14 years 2 months ago
Dynamic Multipath Onion Routing in Anonymous Peer-To-Peer Overlay Networks
— Although recent years provided many protocols for anonymous routing in overlay networks, they commonly rely on the same communication paradigm: Onion Routing. In Onion Routing ...
Olaf Landsiedel, Lexi Pimenidis, Klaus Wehrle, Hei...
ACSAC
2002
IEEE
14 years 1 months ago
Evaluating the Impact of Automated Intrusion Response Mechanisms
Intrusion detection systems (IDSs) have reached a high level of sophistication and are able to detect intrusions with a variety of methods. Unfortunately, system administrators ne...
Thomas Toth, Christopher Krügel
SIGCOMM
2012
ACM
11 years 11 months ago
Measuring and fingerprinting click-spam in ad networks
Advertising plays a vital role in supporting free websites and smartphone apps. Click-spam, i.e., fraudulent or invalid clicks on online ads where the user has no actual interest ...
Vacha Dave, Saikat Guha, Yin Zhang