Sciweavers

5234 search results - page 84 / 1047
» Simulation of Computer Network Attacks
Sort
View
AINA
2006
IEEE
14 years 28 days ago
EC: an edge-based architecture against DDoS attacks and malware spread
The ability to limit unsolicited traffic in the Internet is important to defy DDoS attacks and to contain the spread of worms and viruses. The concept of capabilities, which requir...
Roger Karrer
IWRT
2008
109views Communications» more  IWRT 2008»
13 years 10 months ago
Classification of RFID Attacks
RFID (Radio Frequency Identification) systems are emerging as one of the most pervasive computing technologies in history due to their low cost and their broad applicability. Altho...
Aikaterini Mitrokotsa, Melanie R. Rieback, Andrew ...
PERCOM
2006
ACM
14 years 8 months ago
Is Your Cat Infected with a Computer Virus?
RFID systems as a whole are often treated with suspicion, but the input data received from individual RFID tags is implicitly trusted. RFID attacks are currently conceived as prop...
Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenb...
HPDC
2007
IEEE
14 years 3 months ago
Concepts and components of full-system simulation of distributed memory parallel computers
In this work we discuss a range of approaches to full-system simulation of distributed memory parallel computers, with emphasis on the interconnection network. We present our envi...
Francisco Javier Ridruejo Perez, José Migue...
SIGCOMM
2012
ACM
11 years 11 months ago
First insights from a mobile honeypot
Computer systems are commonly attacked by malicious transport contacts. We present a comparative study that analyzes to what extent those attacks depend on the network access, in ...
Matthias Wählisch, Sebastian Trapp, Christian...