Sciweavers

5234 search results - page 53 / 1047
» Simulation of Computer Network Attacks
Sort
View
GLOBECOM
2008
IEEE
14 years 3 months ago
Wavelet Based Detection of Session Hijacking Attacks in Wireless Networks
— This paper develops a mechanism for detecting session hijacking attacks in wireless networks. The proposed scheme is based on detecting abrupt changes in the strength of the re...
Xiaobo Long, Biplab Sikdar
AINA
2010
IEEE
14 years 27 days ago
Empirical Analysis of Attackers Activity on Multi-tier Web Systems
—Web-based systems commonly face unique set of vulnerabilities and security threats due to their high exposure, access by browsers, and integration with databases. In this paper ...
Katerina Goseva-Popstojanova, Brandon Miller, Rist...
JCP
2008
126views more  JCP 2008»
13 years 9 months ago
Content-Based Computer Simulation of a Networking Course: An Assessment
This paper presents a successful lab simulation experience to teach signal modulation and demodulation concepts in communication and computer networks to computer science and compu...
Giti Javidi, Ehsan Sheybani
ICNP
2006
IEEE
14 years 3 months ago
Mitigating Attacks Against Measurement-Based Adaptation Mechanisms in Unstructured Multicast Overlay Networks
— Many multicast overlay networks maintain application-specific performance goals such as bandwidth, latency, jitter and loss rate by dynamically changing the overlay structure ...
Aaron Walters, David John Zage, Cristina Nita-Rota...
RAID
2007
Springer
14 years 3 months ago
Advanced Allergy Attacks: Does a Corpus Really Help?
Abstract. As research in automatic signature generators (ASGs) receives more attention, various attacks against these systems are being identified. One of these attacks is the “...
Simon P. Chung, Aloysius K. Mok