Sciweavers

986 search results - page 37 / 198
» Protecting the Intranet Against
Sort
View
CCS
2006
ACM
14 years 26 days ago
An effective defense against email spam laundering
Laundering email spam through open-proxies or compromised PCs is a widely-used trick to conceal real spam sources and reduce spamming cost in underground email spam industry. Spam...
Mengjun Xie, Heng Yin, Haining Wang
DIMVA
2006
13 years 10 months ago
Using Labeling to Prevent Cross-Service Attacks Against Smart Phones
Wireless devices that integrate the functionality of PDAs and cell phones are becoming commonplace, making different types of network services available to mobile applications. How...
Collin Mulliner, Giovanni Vigna, David Dagon, Wenk...
ACSAC
2010
IEEE
13 years 7 months ago
Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure
Spread spectrum techniques such as Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping (FH) have been commonly used for anti-jamming wireless communication. However, trad...
An Liu, Peng Ning, Huaiyu Dai, Yao Liu, Cliff Wang
GLOBECOM
2009
IEEE
14 years 1 months ago
Optimized Protection Schemes for Resilient Interdomain Traffic Distribution
Abstract-- Due to the development of Next Generation Networks, leading to a multiservice transport layer with a multidomain environment, the importance of interconnection issues ke...
Miroslaw Kantor, Piotr Cholda, Andrzej Jajszczyk
CIS
2006
Springer
14 years 26 days ago
An Efficient Watermarking Technique Using ADEW and CBWT for Copyright Protection
In this paper, we propose an efficient watermarking technique using adaptive differential energy watermarking (ADEW) and cross binding wavelet tree (CBWT) for copyright protection....
Goo-Rak Kwon, Seung-Won Jung, Sung-Jea Ko