Sciweavers

5234 search results - page 58 / 1047
» Simulation of Computer Network Attacks
Sort
View
SIMULATION
2010
178views more  SIMULATION 2010»
13 years 3 months ago
Application-level Simulation for Network Security
We introduce and describe a novel network simulation tool called NeSSi (Network Security Simulator). NeSSi incorporates a variety of features relevant to network security distingu...
Stephan Schmidt, Rainer Bye, Joël Chinnow, Ka...
EUC
2005
Springer
14 years 2 months ago
Anonymous Routing in Wireless Mobile Ad Hoc Networks to Prevent Location Disclosure Attacks
Wireless Ad Hoc networks are particularly vulnerable due to their fundamental characteristics such as an open medium, dynamic topology, distributed cooperation and constrained capa...
Arjan Durresi, Vamsi Paruchuri, Mimoza Durresi, Le...
ESORICS
2010
Springer
13 years 9 months ago
D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks
We carry out attacks using Internet services that aim to keep telephone devices busy, hindering legitimate callers from gaining access. We use the term DIAL (Digitally Initiated A...
Alexandros Kapravelos, Iasonas Polakis, Elias Atha...
MOBIHOC
2005
ACM
14 years 8 months ago
The feasibility of launching and detecting jamming attacks in wireless networks
Wireless networks are built upon a shared medium that makes it easy for adversaries to launch jamming-style attacks. These attacks can be easily accomplished by an adversary emitt...
Wenyuan Xu, Wade Trappe, Yanyong Zhang, Timothy Wo...
TON
2008
108views more  TON 2008»
13 years 8 months ago
Impact of denial of service attacks on ad hoc networks
Significant progress has been made towards making ad hoc networks secure and DoS resilient. However, little attention has been focused on quantifying DoS resilience: Do ad hoc netw...
Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly