Sciweavers

6164 search results - page 1192 / 1233
» Teaching Computer Security
Sort
View
SIGGRAPH
1999
ACM
15 years 6 months ago
Multi-color and Artistic Dithering
A multi-color dithering algorithm is proposed, which converts a barycentric combination of color intensities into a multi-color nonoverlapping surface coverage. Multi-color dither...
Victor Ostromoukhov, Roger D. Hersch
101
Voted
RAID
1999
Springer
15 years 6 months ago
Defending against a Denial-of-Service Attack on TCP
In this paper we propose a real-time anomaly detection method for detecting TCP SYN-flooding attacks. This method is based on the intensities of SYN segments which are measured on...
Pars Mutaf
164
Voted
NSPW
1998
ACM
15 years 6 months ago
Meta Objects for Access Control: a Formal Model for Role-Based Principals
Object-based programming is becoming more and more popular and is currently conquering the world of distributed programming models. In object-based systems access control is often...
Thomas Riechmann, Franz J. Hauck
119
Voted
CONEXT
2007
ACM
15 years 6 months ago
Practical defenses against BGP prefix hijacking
Prefix hijacking, a misbehavior in which a misconfigured or malicious BGP router originates a route to an IP prefix it does not own, is becoming an increasingly serious security p...
Zheng Zhang, Ying Zhang, Y. Charlie Hu, Zhuoqing M...
ICDCS
2010
IEEE
15 years 6 months ago
Adaptive Jamming-Resistant Broadcast Systems with Partial Channel Sharing
—Wireless communication is particularly vulnerable to signal jamming attacks. Spread spectrum mitigates such problem by spreading normal narrowband signals over a much wider band...
Qi Dong, Donggang Liu
« Prev « First page 1192 / 1233 Last » Next »