Sciweavers

5234 search results - page 140 / 1047
» Simulation of Computer Network Attacks
Sort
View
RAID
2005
Springer
14 years 3 months ago
Defending Against Injection Attacks Through Context-Sensitive String Evaluation
Abstract. Injection vulnerabilities pose a major threat to applicationlevel security. Some of the more common types are SQL injection, crosssite scripting and shell injection vulne...
Tadeusz Pietraszek, Chris Vanden Berghe
MSWIM
2004
ACM
14 years 3 months ago
Scalable simulation of large-scale wireless networks with bounded inaccuracies
Discrete event network simulators have emerged as popular tools for verification and performance evaluation for various wireless networks. Nevertheless, the desire to model such ...
Zhengrong Ji, Junlan Zhou, Mineo Takai, Rajive Bag...
WSC
2007
13 years 12 months ago
Defense and homeland security applications of multi-agent simulations
Department of Defense and Homeland Security analysts are increasingly using multi-agent simulation (MAS) to examine national security issues. This paper summarizes three MAS natio...
Thomas W. Lucas, Susan M. Sanchez, Felix Martinez,...
IJCAI
2001
13 years 11 months ago
Qualitative Simulation of Genetic Regulatory Networks: Method and Application
Computer modeling and simulation are indispensable for understanding the functioning of an organism on a molecular level. We present an implemented method for the qualitative simu...
Hidde de Jong, Michel Page, Céline Hernande...
PERCOM
2010
ACM
13 years 8 months ago
Privacy assurance in mobile sensing networks: Go beyond trusted servers
—Mobile devices are becoming the largest sensor network around the world. They could be used to collect a large amount of data with little effort and cost which is leading to a p...
Ling Hu, Cyrus Shahabi