Sciweavers

986 search results - page 16 / 198
» Protecting the Intranet Against
Sort
View
BROADNETS
2004
IEEE
13 years 11 months ago
Benefits of Link Protection at Connection Granularity
This paper develops a connection establishment framework for protecting connections against single-link failures using link protection at the granularity of a connection, referred...
Karthikeyan Sathyamurthy, Srinivasan Ramasubramani...
FDTC
2007
Springer
124views Cryptology» more  FDTC 2007»
14 years 2 months ago
Countermeasures against Branch Target Buffer Attacks
Branch Prediction Analysis has been recently proposed as an attack method to extract the key from software implementations of the RSA public key cryptographic algorithm. In this p...
Giovanni Agosta, Luca Breveglieri, Gerardo Pelosi,...
ICOIN
2007
Springer
14 years 2 months ago
On Modeling Counteraction against TCP SYN Flooding
One of the main problems of network security is Distributed Denial of Service (DDoS) caused by TCP SYN packet flooding. To counteract SYN flooding attack, several defense methods...
Vladimir V. Shakhov, Hyunseung Choo
EUROSYS
2008
ACM
14 years 5 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
ICDE
2006
IEEE
141views Database» more  ICDE 2006»
14 years 1 months ago
Privacy Protection: p-Sensitive k-Anonymity Property
In this paper, we introduce a new privacy protection property called p-sensitive k-anonymity. The existing kanonymity property protects against identity disclosure, but it fails t...
Traian Marius Truta, Bindu Vinay