Sciweavers

394 search results - page 6 / 79
» The wireless control network: Monitoring for malicious behav...
Sort
View
SPAA
2010
ACM
14 years 1 months ago
Securing every bit: authenticated broadcast in radio networks
This paper studies non-cryptographic authenticated broadcast in radio networks subject to malicious failures. We introduce two protocols that address this problem. The first, Nei...
Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zark...
ITICSE
2009
ACM
14 years 3 months ago
The use of a controlled wireless testbed in courses
Wireless networking has become a popular topic in both undergraduate and graduate courses. However, putting together good assignments in wireless networking is difficult because t...
Peter Steenkiste
SAC
2009
ACM
14 years 3 months ago
Lightweight monitoring of sensor software
Wireless sensors are very small computers, and understanding the timing and behavior of software written for them is crucial to ensuring that they perform correctly. This paper ou...
Mustafa Hammad, Jonathan Cook
PERCOM
2011
ACM
13 years 8 days ago
PoX: Protecting users from malicious Facebook applications
Abstract—Online social networks such as Facebook, MySpace, and Orkut store large amounts of sensitive user data. While a user can legitimately assume that a social network provid...
Manuel Egele, Andreas Moser, Christopher Kruegel, ...
ACISP
2009
Springer
14 years 1 months ago
Measurement Study on Malicious Web Servers in the .nz Domain
Client-side attacks have become an increasing problem on the Internet today. Malicious web pages launch so-called drive-by-download attacks that are capable to gain complete contro...
Christian Seifert, Vipul Delwadia, Peter Komisarcz...