Sciweavers

180 search results - page 26 / 36
» Modular Protections against Non-control Data Attacks
Sort
View
LCN
2008
IEEE
14 years 4 months ago
Firewalling wireless sensor networks: Security by wireless
—Networked sensors and actuators for purposes from production monitoring and control to home automation are in increasing demand. Until recently, the main focus laid on wired sys...
Ivan Martinovic, Nicos Gollan, Jens B. Schmitt
INFOCOM
2005
IEEE
14 years 3 months ago
Distributed algorithms for secure multipath routing
— To proactively defend against intruders from readily jeopardizing single-path data sessions, we propose a distributed secure multipath solution to route data across multiple pa...
Patrick P. C. Lee, Vishal Misra, Dan Rubenstein
INFOCOM
2011
IEEE
13 years 1 months ago
Privacy analysis of user association logs in a large-scale wireless LAN
User association logs collected from a large-scale wireless LAN record where and when a user has used the network. Such information plays an important role in wireless network res...
Keren Tan, Guanhua Yan, Jihwang Yeo, David Kotz
CCS
2009
ACM
14 years 1 months ago
Filter-resistant code injection on ARM
Code injections attacks are one of the most powerful and important classes of attacks on software. In such attacks, the attacker sends malicious input to a software application, w...
Yves Younan, Pieter Philippaerts, Frank Piessens, ...
MDAI
2005
Springer
14 years 3 months ago
Noise-Robust Watermarking for Numerical Datasets
Watermarking has been used on multimedia for a variety of applications, among which intellectual property protection stands out. However, and in spite of a growing need, very few a...
Francesc Sebé, Josep Domingo-Ferrer, Agusti...