Sciweavers

832 search results - page 54 / 167
» Effect of Malicious Synchronization
Sort
View
DSN
2006
IEEE
14 years 1 months ago
An Approach for Detecting and Distinguishing Errors versus Attacks in Sensor Networks
Distributed sensor networks are highly prone to accidental errors and malicious activities, owing to their limited resources and tight interaction with the environment. Yet only a...
Claudio Basile, Meeta Gupta, Zbigniew Kalbarczyk, ...
DMIN
2007
183views Data Mining» more  DMIN 2007»
13 years 11 months ago
Crawling Attacks Against Web-based Recommender Systems
—User profiles derived from Web navigation data are used in important e-commerce applications such as Web personalization, recommender systems, and Web analytics. In the open en...
Runa Bhaumik, Robin D. Burke, Bamshad Mobasher
DIMVA
2009
13 years 11 months ago
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks
Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and brows...
Manuel Egele, Peter Wurzinger, Christopher Kruegel...
IJNSEC
2008
78views more  IJNSEC 2008»
13 years 10 months ago
Fault Tolerant Weighted Voting Algorithms
Agreement algorithms can be categorized in different ways. One categorization of such algorithms is based on whether the final decisions are exact or inexact. In inexact algorithm...
Azad H. Azadmanesh, Alireza Farahani, Lotfi Najjar
JSAC
2006
114views more  JSAC 2006»
13 years 10 months ago
SCAN: self-organized network-layer security in mobile ad hoc networks
Protecting the network layer from malicious attacks is an important yet challenging security issue in mobile ad hoc networks. In this paper we describe SCAN, a unified networklayer...
Hao Yang, J. Shu, Xiaoqiao Meng, Songwu Lu