Sciweavers

49 search results - page 8 / 10
» Vulnerability of insens to denial of service attacks
Sort
View
ACSAC
2005
IEEE
14 years 2 months ago
Defensive Execution of Transactional Processes against Attacks
It is a well known problem that the attack recovery of a self-healing system rolls back not only malicious transactions, but also legitimate transactions that are dependent on the...
Meng Yu, Wanyu Zang, Peng Liu
ICICS
2007
Springer
14 years 2 months ago
Drive-By Pharming
Inexpensive broadband routers are a popular way for people to create an internal, and sometimes wireless, network in their homes. By purchasing such a router and plugging it in, t...
Sid Stamm, Zulfikar Ramzan, Markus Jakobsson
ISSA
2004
13 years 10 months ago
Run-Time Protocol Conformance Verification In Firewalls
Today, business continuity depends significantly on the continuous availability of information systems. It is well-known that such systems must be protected against intrusion and ...
Ulrich Ultes-Nitsche
IPPS
2007
IEEE
14 years 2 months ago
ESSTCP: Enhanced Spread-Spectrum TCP
Having stealth and lightweight authentication methods is empowering network administrators to shelter critical services from adversaries. Spread-Spectrum TCP (SSTCP) [1] is one of...
Amir R. Khakpour, Hakima Chaouchi
INFOCOM
2007
IEEE
14 years 2 months ago
On the Detection of Signaling DoS Attacks on 3G Wireless Networks
— Third Generation (3G) wireless networks based on the CDMA2000 and UMTS standards are now increasingly being deployed throughout the world. Because of their complex signaling an...
Patrick P. C. Lee, Tian Bu, Thomas Y. C. Woo