Sciweavers

394 search results - page 45 / 79
» The wireless control network: Monitoring for malicious behav...
Sort
View
IMC
2006
ACM
14 years 2 months ago
Malware prevalence in the KaZaA file-sharing network
In recent years, more than 200 viruses have been reported to use a peer-to-peer (P2P) file-sharing network as a propagation vector. Disguised as files that are frequently exchan...
Seungwon Shin, Jaeyeon Jung, Hari Balakrishnan
COCOA
2008
Springer
13 years 10 months ago
Optimal Movement of Mobile Sensors for Barrier Coverage of a Planar Region
Intrusion detection, area coverage and border surveillance are important applications of wireless sensor networks today. They can be (and are being) used to monitor large unprotec...
Binay K. Bhattacharya, B. Burmester, Yuzhuang Hu, ...
MOBICOM
2010
ACM
13 years 8 months ago
Sybot: an adaptive and mobile spectrum survey system for wifi networks
Information on site-specific spectrum characteristics is essential to evaluate and improve the performance of wireless networks. However, it is usually very costly to obtain accur...
Kyu-Han Kim, Alexander W. Min, Kang G. Shin
HASE
2007
IEEE
14 years 3 months ago
Fuzzing Wi-Fi Drivers to Locate Security Vulnerabilities
Wireless LANs (WLAN) are becoming ubiquitous, as more and more consumer electronic equipments start to support them. This creates new security concerns, since hackers no longer ne...
Manuel Mendonça, Nuno Ferreira Neves
CSFW
2009
IEEE
14 years 3 months ago
Inputs of Coma: Static Detection of Denial-of-Service Vulnerabilities
—As networked systems grow in complexity, they are increasingly vulnerable to denial-of-service (DoS) attacks involving resource exhaustion. A single malicious input of coma can ...
Richard M. Chang, Guofei Jiang, Franjo Ivancic, Sr...