Sciweavers

923 search results - page 99 / 185
» Improved Slide Attacks
Sort
View
WISA
2007
Springer
15 years 10 months ago
Breaking 104 Bit WEP in Less Than 60 Seconds
We demonstrate an active attack on the WEP protocol that is able to recover a 104-bit WEP key using less than 40,000 frames with a success probability of 50%. In order to succeed i...
Erik Tews, Ralf-Philipp Weinmann, Andrei Pyshkin
P2P
2006
IEEE
119views Communications» more  P2P 2006»
15 years 10 months ago
Defense against Intrusion in a Live Streaming Multicast System
Application-level multicast systems are vulnerable to attacks that impede nodes from receiving desired data. Live streaming protocols are especially susceptible to packet loss ind...
Maya Haridasan, Robbert van Renesse
GECCO
2005
Springer
183views Optimization» more  GECCO 2005»
15 years 9 months ago
802.11 network intrusion detection using genetic programming
Genetic Programming (GP) based Intrusion Detection Systems (IDS) use connection state network data during their training phase. These connection states are recorded as a set of fe...
Patrick LaRoche, A. Nur Zincir-Heywood
ESORICS
2004
Springer
15 years 9 months ago
Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics
Abstract. The recent approach of a model-based framework for steganography fruitfully contributes to the discussion on the security of steganography. In addition, the first propos...
Rainer Böhme, Andreas Westfeld
DSN
2002
IEEE
15 years 9 months ago
Masquerade Detection Using Truncated Command Lines
A masquerade attack, in which one user impersonates another, can be the most serious form of computer abuse. Automatic discovery of masqueraders is sometimes undertaken by detecti...
Roy A. Maxion, Tahlia N. Townsend