Sciweavers

5234 search results - page 114 / 1047
» Simulation of Computer Network Attacks
Sort
View
NCA
2003
IEEE
14 years 2 months ago
Adaptive Use of Network-Centric Mechanisms in Cyber-Defense
Attacks against distributed systems frequently start at the network layer by gathering network related information (such as open TCP ports) and continue on by exhausting resources...
Michael Atighetchi, Partha Pratim Pal, Franklin We...
CHI
2003
ACM
14 years 9 months ago
A tangible interface for IP network simulation
We present the IP Network Design Workbench which supports collaborative network design and simulation by a group of experts and customers. This system is based on a tangible user ...
Kazue Kobayashi, Mitsunori Hirano, Atsunobu Narita...
GECCO
2008
Springer
196views Optimization» more  GECCO 2008»
13 years 10 months ago
A fuzzy-genetic approach to network intrusion detection
Computer networks have expanded significantly in use and numbers. This expansion makes them more vulnerable to attack by malicious agents. Many current intrusion detection systems...
Terrence P. Fries
WWW
2009
ACM
14 years 10 months ago
Towards lightweight and efficient DDOS attacks detection for web server
In this poster, based on our previous work in building a lightweight DDoS (Distributed Denial-of-Services) attacks detection mechanism for web server using TCM-KNN (Transductive C...
Li Guo, Qin-Wu Nie, Tianbo Lu, Yang Li, Zhihong Ti...
LCN
2006
IEEE
14 years 3 months ago
Cross-Level Sensor Network Simulation with COOJA
Simulators for wireless sensor networks are a valuable tool for system development. However, current simulators can only simulate a single level of a system at once. This makes sy...
Fredrik Österlind, Adam Dunkels, Joakim Eriks...