Sciweavers

TELSYS
2010
154views more  TELSYS 2010»
13 years 6 months ago
Blocking attacks on SIP VoIP proxies caused by external processing
As Voice over IP (VoIP) applications become increasingly popular, they are more and more facing security challenges that have not been present in the traditional Public Switched Te...
Ge Zhang, Simone Fischer-Hübner, Sven Ehlert
TELSYS
2010
140views more  TELSYS 2010»
13 years 6 months ago
Information system security compliance to FISMA standard: a quantitative measure
To ensure that safeguards are implemented to protect against a majority of known threats, industry leaders are requiring information processing systems to comply with security stan...
Elaine Hulitt, Rayford B. Vaughn
TELSYS
2010
147views more  TELSYS 2010»
13 years 6 months ago
A new worm propagation threat in BitTorrent: modeling and analysis
Peer-to-peer (p2p) networking technology has gained popularity as an efficient mechanism for users to obtain free services without the need for centralized servers. Protecting thes...
Sinan Hatahet, Abdelmadjid Bouabdallah, Yacine Cha...
TELSYS
2010
104views more  TELSYS 2010»
13 years 6 months ago
The future of security in Wireless Multimedia Sensor Networks - A position paper
Manel Guerrero Zapata, Ruken Zilan, José M....
TELSYS
2010
76views more  TELSYS 2010»
13 years 6 months ago
Traitor tracing over YouTube video service - proof of concept
Joan Tomàs-Buliart, Marcel Fernandez, Migue...
TELSYS
2010
86views more  TELSYS 2010»
13 years 6 months ago
Cross-layer TCP with bitmap error recovery scheme in wireless ad hoc networks
Rung-Shiang Cheng, Der-Jiunn Deng, Yueh-Min Huang,...
TELSYS
2010
71views more  TELSYS 2010»
13 years 6 months ago
A novel user's authentication scheme for pervasive on-line media services
Neng-Wen Wang, Han-Chieh Chao, Ing-Yi Chen, Yueh-M...
TELSYS
2010
132views more  TELSYS 2010»
13 years 6 months ago
Defending the weakest link: phishing websites detection by analysing user behaviours
Phishing detection systems are principally based on the analysis of data moving from phishers to victims. In this paper we describe a novel approach for detecting phishing websites...
Xun Dong, John A. Clark, Jeremy L. Jacob