Sciweavers

5234 search results - page 15 / 1047
» Simulation of Computer Network Attacks
Sort
View
ICCSA
2010
Springer
14 years 3 months ago
Authentication - Based Medium Access Control to Prevent Protocol Jamming: A-MAC
Abstract. Recently, Wireless Local Area Network (WLAN) is used by enterprises, government, and the military, as well as small office and home offices. Although it is convenient, it...
Jaemin Jeung, Seungmyeong Jeong, Jaesung Lim
KIVS
2005
Springer
14 years 2 months ago
A Honeypot Architecture for Detecting and Analyzing Unknown Network Attacks
Patrick Diebold, Andreas Hess, Günter Sch&aum...
NDSS
2007
IEEE
14 years 3 months ago
Army of Botnets
The trend toward smaller botnets may be more dangerous than large botnets, in terms of large-scale attacks like distributed denials of service. We examine the possibility of “su...
Ryan Vogt, John Aycock, Michael J. Jacobson Jr.
RAID
1999
Springer
14 years 1 months ago
Intrusion Detection for an On-Going Attack
An intrusion-detection system (IDS) for an on-going attack is described. Prior to an attack, an IDS operates in anticipation of a general threat. During an attack, the IDS can dea...
Jim Yuill, Shyhtsun Felix Wu, Fengmin Gong, Ming-Y...