Sciweavers

5234 search results - page 28 / 1047
» Simulation of Computer Network Attacks
Sort
View
DAC
2005
ACM
14 years 10 months ago
Simulation models for side-channel information leaks
Small, embedded integrated circuits (ICs) such as smart cards are vulnerable to so-called side-channel attacks (SCAs). The attacker can gain information by monitoring the power co...
Kris Tiri, Ingrid Verbauwhede
MIDDLEWARE
2007
Springer
14 years 3 months ago
Securing peer-to-peer media streaming systems from selfish and malicious behavior
We present a flexible framework for throttling attackers in peerto-peer media streaming systems. In such systems, selfish nodes (e.g., free riders) and malicious nodes (e.g., DoS ...
William Conner, Klara Nahrstedt
LCN
2000
IEEE
14 years 1 months ago
IGMPv3-Based Method for Avoiding DoS Attacks in Multicast-Enabled Networks
Antonio F. Gómez-Skarmeta, Angel L. Mateo-M...