Sciweavers

IJIPT
2010
91views more  IJIPT 2010»
13 years 9 months ago
Detecting and blocking P2P botnets through contact tracing chains
: Peer-to-peer (P2P) botnets have recently become serious security threats on the internet. It is difficult to detect the propagation of P2P botnets by isolated monitoring on indiv...
Zhiyong Huang, Xiaoping Zeng, Yong Liu
JNW
2008
83views more  JNW 2008»
13 years 11 months ago
Substantiating Timing and Behavioral Anomalies in Wireless LANs Using GCL
With the increasing dependence on wireless LANs (WLANs), businesses, educational institutions and other organizations are in need of a reliable security mechanism. The latest secur...
Elankayer Sithirasenan, Vallipuram Muthukkumarasam...
CORR
2007
Springer
123views Education» more  CORR 2007»
13 years 11 months ago
Security in Wireless Sensor Networks: Issues and Challenges
 Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology c...
Al-Sakib Khan Pathan, Hyung-Woo Lee, Choong Seon H...
EVOW
2006
Springer
14 years 2 months ago
BeeHiveGuard: A Step Towards Secure Nature Inspired Routing Algorithms
Abstract. Nature inspired routing protocols for fixed and mobile networks are becoming an active area of research. However, analyzing their security threats and countering them hav...
Horst Wedde, Constantin Timm, Muddassar Farooq
COMPSAC
2006
IEEE
14 years 5 months ago
An Aspect-Oriented Approach to Security Requirements Analysis
This paper presents an aspect-oriented approach to integrated elicitation of functional and security requirements based on use case-driven development. We identify security threat...
Dianxiang Xu, Vivek Goel, Kendall E. Nygard
ISI
2007
Springer
14 years 5 months ago
Managing Security Threats and Vulnerabilities for Small to Medium Enterprises
– The difficulty in managing security threats and vulnerabilities for small and medium-sized enterprises (SME) is investigated. A detailed conceptual framework for asset and thre...
Cyril Onwubiko, Andrew P. Lenaghan
WWW
2008
ACM
14 years 11 months ago
Protecting the web: phishing, malware, and other security threats
Greg Aaron, Katharine A. Bostik, Rod Rasmussen, Ed...