Sciweavers

1804 search results - page 35 / 361
» Measuring denial Of service
Sort
View
PERCOM
2005
ACM
14 years 8 months ago
Towards an Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computing Devices
Mobile computers are subject to a unique form of denial of service attack known as a battery exhaustion attack, in which an attacker attempts to rapidly drain the battery of the d...
Daniel C. Nash, Thomas L. Martin, Dong S. Ha, Mich...
NCA
2008
IEEE
14 years 3 months ago
Finite Memory: A Vulnerability of Intrusion-Tolerant Systems
In environments like the Internet, faults follow unusual patterns, dictated by the combination of malicious attacks with accidental faults such as long communication delays caused...
Giuliana Santos Veronese, Miguel Correia, Lau Cheu...
NDSS
2007
IEEE
14 years 3 months ago
Army of Botnets
The trend toward smaller botnets may be more dangerous than large botnets, in terms of large-scale attacks like distributed denials of service. We examine the possibility of “su...
Ryan Vogt, John Aycock, Michael J. Jacobson Jr.
IEEEARES
2006
IEEE
14 years 3 months ago
Availability Constraints for Avionic Data Buses
— The three traditional objectives of computer security are confidentiality, integrity and availability [8]. Availability can be defined as the prevention of denial of service. C...
Alban Gabillon, Laurent Gallon
ISCC
2006
IEEE
14 years 3 months ago
An Autonomous Architecture for Inter-Domain Traceback across the Borders of Network Operation
The difficulties of achieving an inter-domain traceback architecture come from the issues of overcoming network operation boundaries, especially the leakage of sensitive informat...
Hiroaki Hazeyama, Youki Kadobayashi, Daisuke Miyam...