Sciweavers

240 search results - page 30 / 48
» Malicious Users in Unstructured Networks
Sort
View
ECBS
2002
IEEE
114views Hardware» more  ECBS 2002»
14 years 13 days ago
An Intelligent Agent Security Intrusion System
Network security has now become one of the most important aspects in computer systems and the Internet. Apart from strong encryption, there is no definite method of truly securing...
J. Pikoulas, William J. Buchanan, Mike Mannion, K....
IPPS
2007
IEEE
14 years 1 months ago
Security Threat Prediction in a Local Area Network Using Statistical Model
In today’s large and complex network scenario vulnerability scanners play a major role from security perspective by proactively identifying the known security problems or vulner...
Somak Bhattacharya, S. K. Ghosh
GLOBECOM
2009
IEEE
13 years 11 months ago
Detecting Identity Spoofs in IEEE 802.11e Wireless Networks
Abstract--Wireless networks are vulnerable to identity spoofing attacks, where an attacker can forge the MAC address of his wireless device to assume the identity of another victim...
Gayathri Chandrasekaran, John-Austen Francisco, Vi...
AINA
2009
IEEE
14 years 2 months ago
Enabling Fast Bootstrap of Reputation in P2P Mobile Networks
The easy deployment of P2P self-organized systems has contributed to their wide diffusion and to the definition of a new communication paradigm. Mobile communities can now sponta...
Roberto G. Cascella
ICC
2008
IEEE
164views Communications» more  ICC 2008»
14 years 1 months ago
Detection of Encrypted Tunnels Across Network Boundaries
— The use of covert application-layer tunnels to bypass security gateways has become quite popular in recent years. By encapsulating blocked or controlled protocols such as peert...
Maurizio Dusi, Manuel Crotti, Francesco Gringoli, ...