Sciweavers

5234 search results - page 115 / 1047
» Simulation of Computer Network Attacks
Sort
View
CCS
2003
ACM
14 years 2 months ago
Anomaly detection of web-based attacks
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
Christopher Krügel, Giovanni Vigna
TCC
2005
Springer
108views Cryptology» more  TCC 2005»
14 years 2 months ago
Comparing Two Notions of Simulatability
In this work, relations between the security notions standard simulatability and universal simulatability for cryptographic protocols are investigated. A simulatability-based notio...
Dennis Hofheinz, Dominique Unruh
DAC
2009
ACM
14 years 10 months ago
Analysis and mitigation of process variation impacts on Power-Attack Tolerance
Embedded cryptosystems show increased vulnerabilities to implementation attacks such as power analysis. CMOS technology trends are causing increased process variations which impac...
Lang Lin, Wayne P. Burleson
DAC
1997
ACM
14 years 1 months ago
Hardware/Software Co-Simulation in a VHDL-Based Test Bench Approach
Novel test bench techniques are required to cope with a functional test complexity which is predicted to grow much more strongly than design complexity. Our test bench approach at...
Matthias Bauer, Wolfgang Ecker
CAMAD
2006
IEEE
14 years 1 months ago
P2PRealm - peer-to-peer network simulator
Abstract--Peer-to-Peer Realm (P2PRealm) is an efficient peer-topeer network simulator for studying algorithms based on neural networks. In contrast to many simulators, which emphas...
Niko Kotilainen, Mikko Vapa, Teemu Keltanen, Annem...