Sciweavers

5234 search results - page 107 / 1047
» Simulation of Computer Network Attacks
Sort
View
NDSS
2006
IEEE
14 years 3 months ago
Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks
The custom, ad hoc nature of web applications makes learning-based anomaly detection systems a suitable approach to provide early warning about the exploitation of novel vulnerabi...
William K. Robertson, Giovanni Vigna, Christopher ...
DSN
2011
IEEE
12 years 9 months ago
Applying game theory to analyze attacks and defenses in virtual coordinate systems
—Virtual coordinate systems provide an accurate and efficient service that allows hosts on the Internet to determine latency to arbitrary hosts based on information provided by ...
Sheila Becker, Jeff Seibert, David Zage, Cristina ...
IH
2009
Springer
14 years 3 months ago
Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions
Abstract. A physically unclonable function (PUF) is a multiple-input, multipleoutput, large entropy physical system that is unreproducible due to its structural complexity. A publi...
Nathan Beckmann, Miodrag Potkonjak
EUROCRYPT
1998
Springer
14 years 1 months ago
Securing Threshold Cryptosystems against Chosen Ciphertext Attack
For the most compelling applications of threshold cryptosystems, security against chosen ciphertext attack is a requirement. However, prior to the results presented here, there ap...
Victor Shoup, Rosario Gennaro
DSN
2007
IEEE
14 years 3 months ago
Enhancing DNS Resilience against Denial of Service Attacks
The Domain Name System (DNS) is a critical Internet infrastructure that provides name to address mapping services. In the past few years, distributed denial of service (DDoS) atta...
Vasileios Pappas, Daniel Massey, Lixia Zhang