Sciweavers

7741 search results - page 51 / 1549
» Security in Active Networks
Sort
View
107
Voted
GLOBECOM
2007
IEEE
15 years 9 months ago
Passive Listening and Intrusion Management in Commodity Wi-Fi Networks
—We examine a widely accepted myth about passive listening in wireless networks, and give a detailed description of how to achieve real “passive listening.” Then we develop a...
Liran Ma, Amin Y. Teymorian, Xiuzhen Cheng
89
Voted
HICSS
2009
IEEE
130views Biometrics» more  HICSS 2009»
15 years 10 months ago
Active Learning in the Security Classroom
Dino Schweitzer, David Gibson, Mike Collins
ISCC
2002
IEEE
15 years 8 months ago
An active security protocol against DoS attacks
Domenico Cotroneo, L. Peluso, Simon Pietro Romano,...
ACSAC
2005
IEEE
15 years 9 months ago
Detecting Intra-enterprise Scanning Worms based on Address Resolution
Signature-based schemes for detecting Internet worms often fail on zero-day worms, and their ability to rapidly react to new threats is typically limited by the requirement of som...
David Whyte, Paul C. van Oorschot, Evangelos Krana...