Sciweavers

2691 search results - page 527 / 539
» Security in Ad Hoc Networks
Sort
View
CSREAPSC
2006
13 years 11 months ago
M2MI Service Discovery Middleware Framework
The Many-to-Many-Invocation (M2MI) Service Discovery Middleware Framework provides an API for publishing, providing, and using services in a serverless ad hoc network of devices im...
Hans-Peter Bischof, Joel Donado
SP
2007
IEEE
157views Security Privacy» more  SP 2007»
14 years 4 months ago
Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems
Many proposed low-latency anonymous communication systems have used various flow transformations such as traffic padding, adding cover traffic (or bogus packets), packet droppi...
Xinyuan Wang, Shiping Chen, Sushil Jajodia
POPL
2006
ACM
14 years 10 months ago
The essence of command injection attacks in web applications
Web applications typically interact with a back-end database to retrieve persistent data and then present the data to the user as dynamically generated output, such as HTML web pa...
Zhendong Su, Gary Wassermann
SP
2008
IEEE
176views Security Privacy» more  SP 2008»
14 years 4 months ago
Casting out Demons: Sanitizing Training Data for Anomaly Sensors
The efficacy of Anomaly Detection (AD) sensors depends heavily on the quality of the data used to train them. Artificial or contrived training data may not provide a realistic v...
Gabriela F. Cretu, Angelos Stavrou, Michael E. Loc...
IMC
2009
ACM
14 years 4 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...