Sciweavers

5234 search results - page 21 / 1047
» Simulation of Computer Network Attacks
Sort
View
CCS
2010
ACM
13 years 7 months ago
Exploiting social networking sites for spam
In this work we present our friend-in-the-middle attacks on SNSs and how it can be used to harvest social data in an automated fashion. This social data can then be exploited for ...
Marcus Huber, Martin Mulazzani, Edgar Weippl, Gerh...
CCS
2009
ACM
14 years 3 months ago
False data injection attacks against state estimation in electric power grids
A power grid is a complex system connecting electric power generators to consumers through power transmission and distribution networks across a large geographical area. System mo...
Yao Liu, Michael K. Reiter, Peng Ning
WSC
2007
13 years 11 months ago
Modeling bioterrorism preparedness with simulation in rural healthcare system
As a result of the anthrax letter incidents in 2001, concerns about terrorists’ use of biological agents have increased dramatically at government state and federal levels. The ...
Lisa Patvivatsiri, Elliot J. Montes Jr., Ouyang Xi
PET
2007
Springer
14 years 3 months ago
Two-Sided Statistical Disclosure Attack
We introduce a new traffic analysis attack: the Two-sided Statistical Disclosure Attack, that tries to uncover the receivers of messages sent through an anonymizing network support...
George Danezis, Claudia Díaz, Carmela Tronc...
EJWCN
2010
237views more  EJWCN 2010»
13 years 3 months ago
A Secure Localization Approach against Wormhole Attacks Using Distance Consistency
Abstract--Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sn...
Honglong Chen, Wei Lou, Xice Sun, Zhi Wang