Sciweavers

5234 search results - page 137 / 1047
» Simulation of Computer Network Attacks
Sort
View
ACSAC
2000
IEEE
14 years 1 months ago
Less Harm, Less Worry or How to Improve Network Security by Bounding System Offensiveness
In this paper we describe a new class of tools for protecting computer systems from security attacks. Their distinguished feature is the principle they are based on. Host or netwo...
Danilo Bruschi, Lorenzo Cavallaro, Emilia Rosti
WAPCV
2004
Springer
14 years 2 months ago
TarzaNN: A General Purpose Neural Network Simulator for Visual Attention Modeling
A number of computational models of visual attention exist, but making comparisons is difficult due to the incompatible implementations and levels at which the simulations are con...
Albert L. Rothenstein, Andrei Zaharescu, John K. T...
DAC
2003
ACM
14 years 2 months ago
A timing-accurate modeling and simulation environment for networked embedded systems
The design of state-of-the-art, complex embedded systems requires the capability of modeling and simulating the complex networked environment in which such systems operate. This i...
Franco Fummi, Giovanni Perbellini, Paolo Gallo, Ma...
TDSC
2010
168views more  TDSC 2010»
13 years 4 months ago
An Advanced Hybrid Peer-to-Peer Botnet
A "botnet" consists of a network of compromised computers controlled by an attacker ("botmaster"). Recently botnets have become the root cause of many Internet ...
Ping Wang, Sherri Sparks, Cliff Changchun Zou
IJNSEC
2006
162views more  IJNSEC 2006»
13 years 9 months ago
Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks
Mobile ad-hoc wireless networks are established in improvised environments through the mutual cooperation of its participating nodes. These nodes often operate in a physically ins...
Asad Amir Pirzada, Chris McDonald