Sciweavers

7741 search results - page 51 / 1549
» Security in Active Networks
Sort
View
GLOBECOM
2007
IEEE
14 years 3 months ago
Passive Listening and Intrusion Management in Commodity Wi-Fi Networks
—We examine a widely accepted myth about passive listening in wireless networks, and give a detailed description of how to achieve real “passive listening.” Then we develop a...
Liran Ma, Amin Y. Teymorian, Xiuzhen Cheng
HICSS
2009
IEEE
130views Biometrics» more  HICSS 2009»
14 years 3 months ago
Active Learning in the Security Classroom
Dino Schweitzer, David Gibson, Mike Collins
ISCC
2002
IEEE
14 years 2 months ago
An active security protocol against DoS attacks
Domenico Cotroneo, L. Peluso, Simon Pietro Romano,...
ACSAC
2005
IEEE
14 years 2 months ago
Detecting Intra-enterprise Scanning Worms based on Address Resolution
Signature-based schemes for detecting Internet worms often fail on zero-day worms, and their ability to rapidly react to new threats is typically limited by the requirement of som...
David Whyte, Paul C. van Oorschot, Evangelos Krana...