• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 15,148
Next 10 →

TABLE 3: Active Attacks

in Newcastle upon Tyne,
by R. Benjamin, B. Gladman, Worcester Wr Jy, B. Randell

TABLE 3. Active attacks.

in 1.1. Background Protecting IT Systems from Cyber Crime
by R. Benjamin, B. Gladman, B. Randell

TABLE 3: Active Attacks

in Protecting IT Systems from Cyber Crime
by R. Benjamin, Bristol Bs Oue, B. Gladman, B. Randell

Table 4.1. Passive vs. Active attacks

in unknown title
by unknown authors

Table 4.1. Passive vs. Active attacks

in unknown title
by unknown authors

Table 4: Scan Activity as Prelude to Attack.

in Tracking Darkports for Network Defense
by David Whyte, P. C. Oorschot, Evangelos Kranakis
"... In PAGE 6: ... Our analysis on a four-week network data set reveals a majority of scanning attempts directed against services not offered by the network (see later discussion of Figure 3). In the instances when the scanning was directed against a service offered by the network, an attack always followed (see Table4 and discussion in Section 5.2).... In PAGE 11: ... Mail relaying is prohibited by our mail server and the responses from the mail server to the attacking system indicate that no relaying occurred; analysis of the network traces also showed that the repeated SSH login attempts were all unsuccessful. Some of these systems scanned and attacked multiple services; this explains why the number of scan/attack entities in Table4 is 121, while the actual number of unique IPs addresses was 66. With the exception of a single distributed scan (see Table 3), two characteristics of this activity occurred: (1) scanning was always the precursor to the actual attack, and (2) whenever a scan was directed against a service offered by the network (i.... ..."

Table 4. Scan Activity as Prelude to Attack. NEM Entry Scan/Attack Scans or

in Tracking Darkports for Network Defense
by David Whyte, Paul C. Oorschot, Evangelos Kranakis
"... In PAGE 5: ... Our analysis on a four-week network data set reveals a majority of scanning attempts directed against services not offered by the network. In the instances when the scanning was directed against a service offered by the network, an at- tack usually followed (see Table4 and discussion in Section 5.2).... In PAGE 7: ... Mail relaying is prohibited by our mail server and the responses from the mail server to the at- tacking system indicate that no relaying occurred; analysis of the network traces also showed that the repeated SSH lo- gin attempts were all unsuccessful. Some of these systems scanned and attacked multiple services; this explains why the number of scan/attack entities in Table4 is 121, while the actual number of unique IPs addresses was 66. With the exception of a single distributed scan (see Table 3), two char- acteristics of this activity occurred: (1) scanning was always the precursor to the actual attack, and (2) whenever a scan was directed against a service offered by the network (i.... ..."

Table 2: Security of cookie authentication mechanisms using legacy browsers and locked cookie browsers. Each cell reports the strongest threat model resisted by each combination of authentication mech- anism and browser type. We consider phishing, pharming, and active attacks (Section 2.1).

in Locked cookies: Web authentication security against phishing, pharming, and active attacks
by Chris K. Karlof, Umesh Shankar, Doug Tygar, David Wagner, Chris Karlof, Doug Tygar, Umesh Shankar, David Wagner 2007

Table 6 Juvenile Criminal Activity

in Economic Conditions, Deterrence and Juvenile Crime: Evidence from Micro Data
by H. Naci Mocan, Dainel I. Rees 1999
"... In PAGE 9: ...II. Juvenile Crime in the U.S. Column I of Table6 displays the population-weighted juvenile crime participation rates for different offenses obtained from our data set. For comparison purposes, column II presents the participation rates obtained from Wave 3 of the National Youth Survey, conducted in 1979 (Ploeger 1997).... In PAGE 10: ... Column V displays the number of juvenile crimes suggested by the algorithm. Table6 indicates that the imputation of juvenile crime using official arrest and victimization data may overstate the extent of juvenile theft, and understate juvenile assault and robbery. IV.... ..."
Cited by 4

Table 1: Security Attacks Classification

in A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks
by Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei
"... In PAGE 3: ... A passive attack obtains data exchanged in the network without disrupting the operation of the communications, while an active attack involves information interruption, mod- ification, or fabrication, thereby disrupting the normal functionality of a MANET. Table1 shows the general taxonomy of security attacks against MANET. Exam- ples of passive attacks are eavesdropping, traffic analysis, and traffic monitoring.... ..."
Next 10 →
Results 1 - 10 of 15,148
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University