Sciweavers

214 search results - page 41 / 43
» Measuring Security Risk of Networks Using Attack Graphs
Sort
View
CONEXT
2009
ACM
13 years 8 months ago
ARES: an anti-jamming reinforcement system for 802.11 networks
Dense, unmanaged 802.11 deployments tempt saboteurs into launching jamming attacks by injecting malicious interference. Nowadays, jammers can be portable devices that transmit int...
Konstantinos Pelechrinis, Ioannis Broustis, Srikan...
EUROSYS
2008
ACM
14 years 4 months ago
Itrustpage: a user-assisted anti-phishing tool
Despite the many solutions proposed by industry and the research community to address phishing attacks, this problem continues to cause enormous damage. Because of our inability t...
Troy Ronda, Stefan Saroiu, Alec Wolman
ISCA
2006
IEEE
133views Hardware» more  ISCA 2006»
14 years 1 months ago
TRAP-Array: A Disk Array Architecture Providing Timely Recovery to Any Point-in-time
RAID architectures have been used for more than two decades to recover data upon disk failures. Disk failure is just one of the many causes of damaged data. Data can be damaged by...
Qing Yang, Weijun Xiao, Jin Ren
WORM
2004
13 years 9 months ago
Toward understanding distributed blackhole placement
The monitoring of unused Internet address space has been shown to be an effective method for characterizing Internet threats including Internet worms and DDOS attacks. Because the...
Evan Cooke, Michael Bailey, Zhuoqing Morley Mao, D...
NDSS
2008
IEEE
14 years 2 months ago
Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority
We study and document an important development in how attackers are using Internet resources: the creation of malicious DNS resolution paths. In this growing form of attack, victi...
David Dagon, Niels Provos, Christopher P. Lee, Wen...