Sciweavers

163 search results - page 24 / 33
» WiFi attack vectors
Sort
View
SASN
2003
ACM
14 years 2 months ago
Modeling vulnerabilities of ad hoc routing protocols
The purpose of this work is to automate the analysis of ad hoc routing protocols in the presence of attackers. To this end, a formal model of protocol behavior is developed in whi...
Shahan Yang, John S. Baras
INCDM
2010
Springer
152views Data Mining» more  INCDM 2010»
14 years 1 months ago
Spam Email Filtering Using Network-Level Properties
Abstract. Spam is serious problem that affects email users (e.g. phishing attacks, viruses and time spent reading unwanted messages). We propose a novel spam email filtering appr...
Paulo Cortez, André Correia, Pedro Sousa, M...
CISIS
2008
IEEE
13 years 11 months ago
Multi-variant Program Execution: Using Multi-core Systems to Defuse Buffer-Overflow Vulnerabilities
While memory-safe and type-safe languages have been available for many years, the vast majority of software is still implemented in type-unsafe languages such as C/C++. Despite ma...
Babak Salamat, Andreas Gal, Todd Jackson, Karthike...
CRITIS
2009
13 years 10 months ago
Energy Theft in the Advanced Metering Infrastructure
Abstract. Global energy generation and delivery systems are transitioning to a new computerized "smart grid". One of the principle components of the smart grid is an adva...
Stephen E. McLaughlin, Dmitry Podkuiko, Patrick Mc...
ICIP
2004
IEEE
14 years 11 months ago
Non-uniform quantizer design for image data hiding
Most quantizer based data hiding schemes use uniform quantizer, which is not optimal if the host signal is not uniformly distributed. In this paper, we design a quantizer that is ...
Ning Liu, Koduvayur P. Subbalakshmi