Sciweavers

394 search results - page 5 / 79
» The wireless control network: Monitoring for malicious behav...
Sort
View
INFOCOM
2010
IEEE
13 years 7 months ago
Malicious Shellcode Detection with Virtual Memory Snapshots
Abstract—Malicious shellcodes are segments of binary code disguised as normal input data. Such shellcodes can be injected into a target process’s virtual memory. They overwrite...
Boxuan Gu, Xiaole Bai, Zhimin Yang, Adam C. Champi...
INFOCOM
2007
IEEE
14 years 2 months ago
Malicious Users in Unstructured Networks
—Unstructured networks (like ad-hoc or peer-to-peer networks) are networks without centralized control of their operation. Users make local decisions regarding whether to follow ...
George Theodorakopoulos, John S. Baras
PDCAT
2004
Springer
14 years 1 months ago
A High-Level Policy Description Language for the Network ACL
Malicious codes and worms comprise the largest portion of the loss caused the security problem in the Internet. Small worms such as the “Blaster” spread quickly through the eno...
Jangha Kim, Kanghee Lee, Sangwook Kim, Jungtaek Se...
WINET
2010
129views more  WINET 2010»
13 years 7 months ago
Characterizing 802.11 wireless link behavior
Since wireless signals propagate through the ether, they are significantly affected by attenuation, fading, multipath, and interference. As a result, it is difficult to measure ...
Glenn Judd, Peter Steenkiste
CNSR
2007
IEEE
117views Communications» more  CNSR 2007»
14 years 2 months ago
Structural Monitoring using Wireless Sensors and Controller Area Network
— This paper investigates implementation and design issues for a heterogeneous network for structural monitoring. The proposed application uses wireless sensors and the controlle...
Gregory Jaman, Sajid Hussain