Sciweavers

197 search results - page 3 / 40
» Feasibility of Multi-Protocol Attacks
Sort
View
TELSYS
2010
154views more  TELSYS 2010»
13 years 2 months ago
Blocking attacks on SIP VoIP proxies caused by external processing
As Voice over IP (VoIP) applications become increasingly popular, they are more and more facing security challenges that have not been present in the traditional Public Switched Te...
Ge Zhang, Simone Fischer-Hübner, Sven Ehlert
ICDCS
2011
IEEE
12 years 6 months ago
Localizing Multiple Jamming Attackers in Wireless Networks
Abstract—Jamming attacks and unintentional radio interference are one of the most urgent threats harming the dependability of wireless communication and endangering the successfu...
Hongbo Liu, Zhenhua Liu, Yingying Chen, Wenyuan Xu
TRIDENTCOM
2010
IEEE
13 years 5 months ago
A Testbed for Validation and Assessment of Frame Switching Networks
Packet assembly at the network edge is one solution to reduce high packet rates in core network switches. Literature discusses this topic controversially because of three reasons: ...
Arthur Mutter, Sebastian Gunreben, Wolfram Lautens...
ICMCS
2008
IEEE
150views Multimedia» more  ICMCS 2008»
14 years 1 months ago
Attack by colorization of a grey-level image hiding its color palette
In this paper, we present a novel attack named colorization attack. This attack is specific to color-hiding watermarking schemes. The objective of this work is to demonstrate the...
Marc Chaumont, William Puech
HPCC
2005
Springer
14 years 25 days ago
Securing the MPLS Control Plane
— In an increasingly hostile environment, the need for security in network infrastructure is stronger than ever, especially for Multi-Protocol Label Switching (MPLS), widely used...
Francesco Palmieri, Ugo Fiore