Sciweavers

18 search results - page 1 / 4
» Searching for the Optimum Correlation Attack
Sort
View
FSE
1994
Springer
110views Cryptology» more  FSE 1994»
13 years 11 months ago
Searching for the Optimum Correlation Attack
Ross J. Anderson
ICPR
2008
IEEE
14 years 8 months ago
Recovering audio-to-video synchronization by audiovisual correlation analysis
Audio-to-video synchronization (AV-sync) may drift and is difficult to recover without dedicated human effort. In this work, we develop an interactive method to recover the drifte...
Yoichi Sato, Yuyu Liu
COMCOM
2006
88views more  COMCOM 2006»
13 years 7 months ago
Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts
To defend against multi-step intrusions in high-speed networks, efficient algorithms are needed to correlate isolated alerts into attack scenarios. Existing correlation methods us...
Lingyu Wang, Anyi Liu, Sushil Jajodia
ACSW
2006
13 years 9 months ago
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and net...
Rupinder Gill, Jason Smith, Andrew Clark
ICAC
2007
IEEE
13 years 11 months ago
Strider Search Ranger: Towards an Autonomic Anti-Spam Search Engine
Search spammers use questionable search engine optimization techniques to promote their spam links into top search results. Large-scale spammers target commerce queries that they ...
Yi-Min Wang, Ming Ma