Sciweavers

362 search results - page 51 / 73
» Extending the Resynchronization Attack
Sort
View
ESORICS
2008
Springer
13 years 10 months ago
State Space Reduction in the Maude-NRL Protocol Analyzer
The Maude-NRL Protocol Analyzer (Maude-NPA) is a tool and inference system for reasoning about the security of cryptographic protocols in which the cryptosystems satisfy different ...
Santiago Escobar, Catherine Meadows, José M...
AAAI
2006
13 years 10 months ago
When Gossip is Good: Distributed Probabilistic Inference for Detection of Slow Network Intrusions
Intrusion attempts due to self-propagating code are becoming an increasingly urgent problem, in part due to the homogeneous makeup of the internet. Recent advances in anomalybased...
Denver Dash, Branislav Kveton, John Mark Agosta, E...
ADHOC
2007
109views more  ADHOC 2007»
13 years 8 months ago
Access control in wireless sensor networks
Nodes in a sensor network may be lost due to power exhaustion or malicious attacks. To extend the lifetime of the sensor network, new node deployment is necessary. In military sce...
Yun Zhou, Yanchao Zhang, Yuguang Fang
TIP
2010
117views more  TIP 2010»
13 years 3 months ago
Cooperation Stimulation Strategies for Peer-to-Peer Wireless Live Video-Sharing Social Networks
Abstract--Human behavior analysis in video sharing social networks is an emerging research area, which analyzes the behavior of users who share multimedia content and investigates ...
W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu
ICDCSW
2005
IEEE
14 years 2 months ago
Adaptive Real-Time Anomaly Detection with Improved Index and Ability to Forget
Anomaly detection in IP networks, detection of deviations from what is considered normal, is an important complement to misuse detection based on known attack descriptions. Perfor...
Kalle Burbeck, Simin Nadjm-Tehrani