Sciweavers

5234 search results - page 35 / 1047
» Simulation of Computer Network Attacks
Sort
View
105
Voted
BROADNETS
2007
IEEE
15 years 2 months ago
Simulation study of the spectral capacity requirements of Switched Digital Broadcast
Jiong Gong, Daniel A. Vivanco, Jim Martin
ICON
2007
IEEE
15 years 8 months ago
A Study of the TKIP Cryptographic DoS Attack
—Wireless networks, especially those based on 802.11, have found widespread use in domestic, commercial, educational, military and public-safety environments. The security of the...
Stephen Mark Glass, Vallipuram Muthukkumarasamy
146
Voted
APNOMS
2006
Springer
15 years 6 months ago
IP Traceback Algorithm for DoS/DDoS Attack
Abstract. DoS(Denial of Service) / DDoS(Distributed Denial of Service) attacks threaten Internet security nowadays. However, the current Internet protocol and backbone network do n...
Hong-bin Yim, Jae-il Jung
IEEEARES
2006
IEEE
15 years 8 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
MSWIM
2006
ACM
15 years 8 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt