Sciweavers

832 search results - page 87 / 167
» Effect of Malicious Synchronization
Sort
View
ACSAC
2006
IEEE
14 years 4 months ago
Secure Distributed Cluster Formation in Wireless Sensor Networks
In wireless sensor networks, clustering sensor nodes into small groups is an effective technique to achieve scalability, self-organization, power saving, channel access, routing, ...
Kun Sun, Pai Peng, Peng Ning, Cliff Wang
ICMCS
2006
IEEE
141views Multimedia» more  ICMCS 2006»
14 years 4 months ago
Ripple-Stream: Safeguarding P2P Streaming Against Dos Attacks
— Compared with file-sharing and distributed hash table (DHT) network, P2P streaming is more vulnerable to denial of service (DoS) attacks because of its high bandwidth demand a...
Wenjie Wang, Yongqiang Xiong, Qian Zhang, Sugih Ja...
ICNP
2006
IEEE
14 years 4 months ago
Mitigating Attacks Against Measurement-Based Adaptation Mechanisms in Unstructured Multicast Overlay Networks
— Many multicast overlay networks maintain application-specific performance goals such as bandwidth, latency, jitter and loss rate by dynamically changing the overlay structure ...
Aaron Walters, David John Zage, Cristina Nita-Rota...
WISE
2006
Springer
14 years 4 months ago
Finding Reliable Recommendations for Trust Model
This paper presents a novel context-based approach to find reliable recommendations for trust model in ubiquitous environments. Context is used in our approach to analyze the user...
Weiwei Yuan, Donghai Guan, Sungyoung Lee, Young-Ko...
DSN
2005
IEEE
14 years 3 months ago
Defeating Memory Corruption Attacks via Pointer Taintedness Detection
Most malicious attacks compromise system security through memory corruption exploits. Recently proposed techniques attempt to defeat these attacks by protecting program control da...
Shuo Chen, Jun Xu, Nithin Nakka, Zbigniew Kalbarcz...