Sciweavers

5234 search results - page 3 / 1047
» Simulation of Computer Network Attacks
Sort
View
SAC
2009
ACM
14 years 2 months ago
Improving stream correlation attacks on anonymous networks
The level of anonymity offered by low latency, interactive, anonymous networks is unknown. This paper implements correlation attacks on the deployed Tor network and a simulated T...
Gavin O'Gorman, Stephen Blott
LCN
2005
IEEE
14 years 1 months ago
A Novel Tuneable Low-Intensity Adversarial Attack
— Currently, Denial of Service (DoS) attacks remain amongst the most critical threats to Internet applications. The goal of the attacker in a DoS attack is to overwhelm a shared ...
Salil S. Kanhere, Anjum Naveed
SERSCISA
2009
Springer
14 years 2 months ago
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promi...
Yongjin Kim
ISF
2008
114views more  ISF 2008»
13 years 7 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
PERCOM
2008
ACM
14 years 7 months ago
Protecting Users' Anonymity in Pervasive Computing Environments
The large scale adoption of adaptive services in pervasive and mobile computing is likely to be conditioned to the availability of reliable privacy-preserving technologies. Unfort...
Linda Pareschi, Daniele Riboni, Claudio Bettini