Sciweavers

5234 search results - page 60 / 1047
» Simulation of Computer Network Attacks
Sort
View
IJCNN
2000
IEEE
14 years 1 months ago
Applying CMAC-Based On-Line Learning to Intrusion Detection
The timely and accurate detection of computer and network system intrusions has always been an elusive goal for system administrators and information security researchers. Existin...
James Cannady
GLOBECOM
2010
IEEE
13 years 7 months ago
Performance Analysis of Dynamic Spectrum Access Networks under Primary User Emulation Attacks
Primary user emulation attack (PUEA) is a denial of service (DoS) attack unique to dynamic spectrum access (DSA) networks. While there have been studies in the literature to detect...
Z. Jin, S. Anand, K. P. Subbalakshmi
JSAC
2008
199views more  JSAC 2008»
13 years 9 months ago
Defense against Primary User Emulation Attacks in Cognitive Radio Networks
Cognitive Radio (CR) is a promising technology that can alleviate the spectrum shortage problem by enabling unlicensed users equipped with CRs to coexist with incumbent users in li...
Ruiliang Chen, Jung Min Park, Jeffrey H. Reed
IPPS
2007
IEEE
14 years 3 months ago
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
B. Sathish Babu, Pallapa Venkataram
ICDCS
2005
IEEE
14 years 2 months ago
On Flow Marking Attacks in Wireless Anonymous Communication Networks
— This paper studies the degradation of anonymity in a flow-based wireless mix network under flow marking attacks, in which an adversary embeds a recognizable pattern of marks ...
Xinwen Fu, Ye Zhu, Bryan Graham, Riccardo Bettati,...