SYN flooding is one of classical Denial of Service (DoS) attacks abusing the TCP 3-way handshake process. This attack causes a server not to accept additional connection requests...
Tae Hyung Kim, Young-Sik Choi, Jong Kim, Sung Je H...
Address harvesting is the act of searching a compromised host for the names and addresses of other targets to attack, such as occurs when an email virus locates target addresses f...
Stuart E. Schechter, Jaeyeon Jung, Will Stockwell,...
Code injection attacks, despite being well researched, continue to be a problem today. Modern architectural solutions such as the NX-bit and PaX have been useful in limiting the a...
Abstract. This paper evaluates the performance of INSENS, an INtrusion-tolerant routing protocol for wireless SEnsor Networks. Security in sensor networks is important in battlefi...
In this paper, we study both the jamming capability of the cognitiveradio-based jammers and the anti-jamming capability of the cognitive radio networks. We first setup the models...