Sciweavers

143 search results - page 23 / 29
» Strategies against Replay Attacks
Sort
View
CCS
2003
ACM
14 years 21 days ago
DoS protection for UDP-based protocols
Since IP packet reassembly requires resources, a denial of service attack can be mounted by swamping a receiver with IP fragments. In this paper we argue how this attack need not ...
Charlie Kaufman, Radia J. Perlman, Bill Sommerfeld
IV
2002
IEEE
88views Visualization» more  IV 2002»
14 years 11 days ago
VICO: A Tool for Supporting Visual Comparisons of Different Pine-Beetle Management Approaches
In this paper a visual tool for comparing different mountain pine-beetle management approaches is presented. This comparison tool gives the users the possibility of viewing their ...
Angela Cristina Duta, M. Sheelagh T. Carpendale, K...
IMCSIT
2010
13 years 5 months ago
Selected Security Aspects of Agent-based Computing
The paper presents selected security aspects related to confidentiality, privacy, trust and authenticity issues of a distributed, agent-based computing. Particular attention has be...
Mariusz R. Matuszek, Piotr Szpryngier
MOBICOM
2004
ACM
14 years 27 days ago
Denial of service resilience in ad hoc networks
Significant progress has been made towards making ad hoc networks secure and DoS resilient. However, little attention has been focused on quantifying DoS resilience: Do ad hoc ne...
Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly
IAW
2003
IEEE
14 years 22 days ago
Wireless Intrusion Detection and Response
— Intrusion detection and countermeasures response is an active area of research. In this paper, we examine integrating an intrusion detection engine with an active countermeasur...
Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. ...