Sciweavers

1804 search results - page 70 / 361
» Measuring denial Of service
Sort
View
AINA
2010
IEEE
13 years 26 days ago
A Novel Cross Layer Intrusion Detection System in MANET
— Intrusion detection System forms a vital component of internet security. To keep pace with the growing trends, there is a critical need to replace single layer detection techno...
Rakesh Shrestha, Kyong-Heon Han, Dong-You Choi, Se...
AINA
2011
IEEE
13 years 25 days ago
Auctions for Secure Multi-party Policy Negotiation in Ambient Intelligence
—The advent of distributed and ad-hoc-connected systems such as in Ambient Intelligence applications confronts developers with the question on how to specify QoS- and security po...
Julian Schütte, Stephan Heuser
ARESEC
2011
76views more  ARESEC 2011»
12 years 9 months ago
A Complexity Based Forensic Analysis of the Trojan Horse Defence
—The Operational Complexity Model (OCM) has been used to derive the complexities of the five most prevalent cyber-crimes occurring in southeast Asia, namely peer-to-peer (P2P) mu...
Richard E. Overill, Jantje A. M. Silomon
ICC
2011
IEEE
206views Communications» more  ICC 2011»
12 years 8 months ago
A Stateless Traceback Technique for Identifying the Origin of Attacks from a Single Packet
—Anonymity is one of the main motivations for conducting denial-of-service attacks. Currently, there is no mechanism to either identify the true source of an IP packet or to prov...
Marcelo D. D. Moreira, Rafael P. Laufer, Natalia C...
ELECTRONICMARKETS
2007
69views more  ELECTRONICMARKETS 2007»
13 years 9 months ago
Mobile Service Bundles: The Example of Navigation Services
In this paper we explore which bundles of services are attractive to users. We look specifically in bundle composition with navigation services as core, and travel and entertainme...
Harry Bouwman, Timber Haaker, Henny de Vos