Sciweavers

382 search results - page 71 / 77
» Tracing Network Attacks to Their Sources
Sort
View
NDSS
2009
IEEE
14 years 2 months ago
Detecting Forged TCP Reset Packets
Several off-the-shelf products enable network operators to enforce usage restrictions by actively terminating connections when deemed undesirable. While the spectrum of their appl...
Nicholas Weaver, Robin Sommer, Vern Paxson
ICDE
2009
IEEE
149views Database» more  ICDE 2009»
14 years 9 months ago
OPAQUE: Protecting Path Privacy in Directions Search
Directions search returns the shortest path from a source to a destination on a road network. However, the search interests of users may be exposed to the service providers, thus r...
Ken C. K. Lee, Wang-Chien Lee, Hong Va Leong, Baih...
ACSAC
2005
IEEE
14 years 1 months ago
Java for Mobile Devices: A Security Study
Java 2 Micro-Edition Connected Limited Device Configuration (J2ME CLDC) is the platform of choice when it comes to running mobile applications on resourceconstrained devices (cel...
Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, ...
IPPS
2002
IEEE
14 years 12 days ago
Architecture of the Entropia Distributed Computing System
Distributed Computing, the exploitation of idle cycles on pervasive desktop PC systems offers the opportunity to increase the available computing power by orders of magnitude (10x...
Andrew A. Chien
CCS
2010
ACM
13 years 7 months ago
PinDr0p: using single-ended audio features to determine call provenance
The recent diversification of telephony infrastructure allows users to communicate through landlines, mobile phones and VoIP phones. However, call metadata such as Caller-ID is ei...
Vijay A. Balasubramaniyan, Aamir Poonawalla, Musta...