Sciweavers

986 search results - page 86 / 198
» Protecting the Intranet Against
Sort
View
NDSS
2007
IEEE
14 years 2 months ago
Low-Rate TCP-Targeted DoS Attack Disrupts Internet Routing
Compared to attacks against end hosts, Denial of Service (DoS) attacks against the Internet infrastructure such as those targeted at routers can be more devastating due to their g...
Ying Zhang, Zhuoqing Morley Mao, Jia Wang
SASO
2007
IEEE
14 years 2 months ago
Self-Adaptive Systems for Information Survivability: PMOP and AWDRAT
Information systems form the backbones of the critical infrastructures of modern societies. Unfortunately, these systems are highly vulnerable to attacks that can result in enormo...
Howard E. Shrobe, Robert Laddaga, Robert Balzer, N...
CCS
2010
ACM
13 years 8 months ago
BLADE: an attack-agnostic approach for preventing drive-by malware infections
Web-based surreptitious malware infections (i.e., drive-by downloads) have become the primary method used to deliver malicious software onto computers across the Internet. To addr...
Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wen...
JSAC
2006
140views more  JSAC 2006»
13 years 8 months ago
Backup reprovisioning to remedy the effect of multiple link failures in WDM mesh networks
As networks grow in size and complexity, both the probability and the impact of failures increase. The pre-allocated backup bandwidth, which has been widely investigated in the lit...
Jing Zhang, Keyao Zhu, Biswanath Mukherjee
TCSV
2008
119views more  TCSV 2008»
13 years 8 months ago
Scalable Joint Source-Channel Coding for the Scalable Extension of H.264/AVC
This paper proposes a novel joint source-channel coding (JSCC) methodology which minimizes the end-to-end distortion for the transmission over packet loss channels of scalable vide...
Maryse R. Stoufs, Adrian Munteanu, Jan Cornelis, P...