Sciweavers

708 search results - page 7 / 142
» On the Use of Word Networks to Mimicry Attack Detection
Sort
View
ADHOCNETS
2009
Springer
14 years 3 days ago
Power-Aware Intrusion Detection in Mobile Ad Hoc Networks
Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion ...
Sevil Sen, John A. Clark, Juan E. Tapiador
IPPS
2006
IEEE
14 years 1 months ago
Detecting selective forwarding attacks in wireless sensor networks
Selective forwarding attacks may corrupt some missioncritical applications such as military surveillance and forest fire monitoring. In these attacks, malicious nodes behave like...
Bo Yu, Bin Xiao
CCN
2006
278views Communications» more  CCN 2006»
13 years 9 months ago
Detecting rogue devices in bluetooth networks using radio frequency fingerprinting
Unauthorized Bluetooth devices or rogue devices can impersonate legitimate devices through address and link key spoofing. Moreover, they can infiltrate a Bluetooth network and ini...
Jeyanthi Hall, Michel Barbeau, Evangelos Kranakis
DIMVA
2007
13 years 9 months ago
A Study of Malcode-Bearing Documents
By exploiting the object-oriented dynamic composability of modern document applications and formats, malcode hidden in otherwise inconspicuous documents can reach third-party appli...
Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, ...
ICNS
2007
IEEE
14 years 1 months ago
A Detection and Offense Mechanism to Defend Against Application Layer DDoS Attacks
—Application layer DDoS attacks, which are legitimate in packets and protocols, gradually become a pressing problem for commerce, politics and military. We build an attack model ...
Jie Yu, Zhoujun Li, Huowang Chen, Xiaoming Chen