To search, Click below search items.

 

All Published Papers Search Service

Results for ; Total 10675

Title

Worm Poisoning Technology and Application

Author

Bing Wu, Xiaochun Yun, Xiang Cui

Citation

Vol. 6  No. 6  pp. 236-244

Keywords

Poisoning, PoisonWorm, SIPR, Detection, DHT, P2P


Title

Analyzing Network Security using Malefactor Action Graphs

Author

Igor Kotenko, Mikhail Stepashkin

Citation

Vol. 6  No. 6  pp. 226-235

Keywords

Vulnerability Assessment, Risk Assessment, Security Metrics, Network attacks, Management of Computing Security


Title

Sharing secret images by using base-transform and small-size host images

Author

Chih Ching Thien, Wen-Pinn Fang, Ja Chen Lin

Citation

Vol. 6  No. 6  pp. 219-225

Keywords

base-transform, sharing, hiding, stego images


Title

SWAN: A Secured Watchdog for Ad hoc Networks

Author

Xiaoyun Xue, Jean Leneutre, Lin Chen, Jalel Ben-Othman

Citation

Vol. 6  No. 6  pp. 209-218

Keywords

Ad hoc networks, watchdog, broadcast message authentication, reputation system


[1] ... [prev] [2581] [2582] [2583] [2584] [2585] [2586] [2587] [2588] [2589] [2590] [next] ... [2669]