Results 1 - 10
of
15,148
Table 4: Scan Activity as Prelude to Attack.
"... In PAGE 6: ... Our analysis on a four-week network data set reveals a majority of scanning attempts directed against services not offered by the network (see later discussion of Figure 3). In the instances when the scanning was directed against a service offered by the network, an attack always followed (see Table4 and discussion in Section 5.2).... In PAGE 11: ... Mail relaying is prohibited by our mail server and the responses from the mail server to the attacking system indicate that no relaying occurred; analysis of the network traces also showed that the repeated SSH login attempts were all unsuccessful. Some of these systems scanned and attacked multiple services; this explains why the number of scan/attack entities in Table4 is 121, while the actual number of unique IPs addresses was 66. With the exception of a single distributed scan (see Table 3), two characteristics of this activity occurred: (1) scanning was always the precursor to the actual attack, and (2) whenever a scan was directed against a service offered by the network (i.... ..."
Table 4. Scan Activity as Prelude to Attack. NEM Entry Scan/Attack Scans or
"... In PAGE 5: ... Our analysis on a four-week network data set reveals a majority of scanning attempts directed against services not offered by the network. In the instances when the scanning was directed against a service offered by the network, an at- tack usually followed (see Table4 and discussion in Section 5.2).... In PAGE 7: ... Mail relaying is prohibited by our mail server and the responses from the mail server to the at- tacking system indicate that no relaying occurred; analysis of the network traces also showed that the repeated SSH lo- gin attempts were all unsuccessful. Some of these systems scanned and attacked multiple services; this explains why the number of scan/attack entities in Table4 is 121, while the actual number of unique IPs addresses was 66. With the exception of a single distributed scan (see Table 3), two char- acteristics of this activity occurred: (1) scanning was always the precursor to the actual attack, and (2) whenever a scan was directed against a service offered by the network (i.... ..."
Table 2: Security of cookie authentication mechanisms using legacy browsers and locked cookie browsers. Each cell reports the strongest threat model resisted by each combination of authentication mech- anism and browser type. We consider phishing, pharming, and active attacks (Section 2.1).
2007
Table 6 Juvenile Criminal Activity
1999
"... In PAGE 9: ...II. Juvenile Crime in the U.S. Column I of Table6 displays the population-weighted juvenile crime participation rates for different offenses obtained from our data set. For comparison purposes, column II presents the participation rates obtained from Wave 3 of the National Youth Survey, conducted in 1979 (Ploeger 1997).... In PAGE 10: ... Column V displays the number of juvenile crimes suggested by the algorithm. Table6 indicates that the imputation of juvenile crime using official arrest and victimization data may overstate the extent of juvenile theft, and understate juvenile assault and robbery. IV.... ..."
Cited by 4
Table 1: Security Attacks Classification
"... In PAGE 3: ... A passive attack obtains data exchanged in the network without disrupting the operation of the communications, while an active attack involves information interruption, mod- ification, or fabrication, thereby disrupting the normal functionality of a MANET. Table1 shows the general taxonomy of security attacks against MANET. Exam- ples of passive attacks are eavesdropping, traffic analysis, and traffic monitoring.... ..."
Results 1 - 10
of
15,148