Sciweavers

149 search results - page 7 / 30
» Protection Mechanisms Against Phishing Attacks
Sort
View
ICOIN
2007
Springer
14 years 1 months ago
On Modeling Counteraction against TCP SYN Flooding
One of the main problems of network security is Distributed Denial of Service (DDoS) caused by TCP SYN packet flooding. To counteract SYN flooding attack, several defense methods...
Vladimir V. Shakhov, Hyunseung Choo
CRITIS
2007
13 years 8 months ago
LoRDAS: A Low-Rate DoS Attack against Application Servers
In a communication network, there always exist some specific servers that should be considered a critical infrastructure to be protected, specially due to the nature of the servic...
Gabriel Maciá-Fernández, Jesú...
NDSS
2007
IEEE
14 years 1 months ago
RICH: Automatically Protecting Against Integer-Based Vulnerabilities
We present the design and implementation of RICH (Run-time Integer CHecking), a tool for efficiently detecting integer-based attacks against C programs at run time. C integer bug...
David Brumley, Dawn Xiaodong Song, Tzi-cker Chiueh...
ERCIMDL
1998
Springer
133views Education» more  ERCIMDL 1998»
13 years 11 months ago
MarketNet: Using Virtual Currency to Protect Information Systems
This paper describes novel market-based technologies for systematic, quantifiable and predictable protection of information systems against attacks. These technologies, incorporate...
Yechiam Yemini, Apostolos Dailianas, Danilo Floris...
CSREAESA
2007
13 years 8 months ago
IT Security Protection at Field Level of Industrial Automation Systems
—Current industrial automation systems are virtually unprotected against attacks on IT security at field level, especially if an attacker is able to connect physically to field...
Felix Gutbrodt