Sciweavers

1294 search results - page 7 / 259
» Securing Against Insider Attacks
Sort
View
IEEEIAS
2009
IEEE
14 years 3 months ago
Detecting Insider Attacks Using Non-negative Matrix Factorization
—It is a fact that vast majority of attention is given to protecting against external threats, which are considered more dangerous. However, some industrial surveys have indicate...
Jan Platos, Václav Snásel, Pavel Kr&...
CCS
2003
ACM
14 years 1 months ago
A new CRT-RSA algorithm secure against bellcore attacks
Johannes Blömer, Martin Otto 0002, Jean-Pierr...
WEBNET
2001
13 years 9 months ago
Managing Distributed Personal Firewalls with Smart Data Servers
: Modern security architectures tend to become more and more complex. Not only the chances to improve Web applications using several data channels and diverse (TCP-)ports are very ...
Ernst Georg Haffner, Uwe Roth, Andreas Heuer 0002,...
EJWCN
2010
237views more  EJWCN 2010»
13 years 3 months ago
A Secure Localization Approach against Wormhole Attacks Using Distance Consistency
Abstract--Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sn...
Honglong Chen, Wei Lou, Xice Sun, Zhi Wang