• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 849
Next 10 →

Secure Routing for Mobile Ad Hoc Networks

by Panagiotis Papadimitratos, Zygmunt Haas - MOBILE COMPUTING AND COMMUNICATIONS REVIEW , 2002
"... For such self-organizing infrastructures as mobile ad hoc networks , envisioned to operate in an open, collaborative, and highly volatile environment, the importance of secu- rity cannot be underrated. The provision of comprehen- sive secure communication mandates that both route dis- covery and dat ..."
Abstract - Cited by 599 (14 self) - Add to MetaCart
and data forwarding be safeguarded. The discussed here Secure Routing Protocol (SRP) [1] counters malicious behavior that targets the discovery of topological informa- tion. The protection of the data transmission is a separate problem: an intermittently misbehaving attacker could first comply

The EigenTrust Algorithm for Reputation Management in

by Networks Sepandar Kamvar, Sepandar D. Kamvar
"... Peer-to-peer file-sharing networks are currently receiving much attention as a means of sharing and distributing information. However, as recent experience with P2P networks such as Gnutella shows, the anonymous, open nature of these networks offers an almost ideal environment for the spread of sel ..."
Abstract - Cited by 301 (2 self) - Add to MetaCart
Peer-to-peer file-sharing networks are currently receiving much attention as a means of sharing and distributing information. However, as recent experience with P2P networks such as Gnutella shows, the anonymous, open nature of these networks offers an almost ideal environment for the spread

Detection and Analysis of Drive-by-Download Attacks and Malicious JavaScript Code

by Marco Cova, Christopher Kruegel, Giovanni Vigna - In WWW 2010 , 2010
"... JavaScript is a browser scripting language that allows developers to create sophisticated client-side interfaces for web applications. However, JavaScript code is also used to carry out attacks against the user’s browser and its extensions. These attacks usually result in the download of additional ..."
Abstract - Cited by 131 (20 self) - Add to MetaCart
malware that takes complete control of the victim’s platform, and are, therefore, called “drive-by downloads. ” Unfortunately, the dynamic nature of the JavaScript language and its tight integration with the browser make it difficult to detect and block malicious JavaScript code. This paper presents a

Learning to Detect Malicious URLs

by Justin Ma, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker - Exploiting Feature Covariance in High-Dimensional Online Learning. In Proceedings of the International Conference on Artificial Intelligence and Statistics (AISTATS , 2011
"... Malicious Web sites are a cornerstone of Internet criminal activities. The dangers of these sites have created a demand for safeguards that protect end-users from visiting them. This article explores how to detect malicious Web sites from the lexical and host-based features of their URLs. We show th ..."
Abstract - Cited by 12 (2 self) - Add to MetaCart
that this problem lends itself naturally to modern algorithms for online learning. Online algorithms not only process large numbers of URLs more efficiently than batch algorithms, they also adapt more quickly to new features in the continuously evolving distribution of malicious URLs. We develop a real-time system

Gossip with Malicious Parties

by Dahlia Malkhi, Elan Pavlov, Yaron Sella , 2003
"... Gossip (epidemic) protocols are attractive for achieving information dissemination in distributed systems due to their simplicity, scalability and natural fault tolerance. In this paper, we present a gossip algorithm for propagating information in the presence of malicious parties. ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Gossip (epidemic) protocols are attractive for achieving information dissemination in distributed systems due to their simplicity, scalability and natural fault tolerance. In this paper, we present a gossip algorithm for propagating information in the presence of malicious parties.

Outsourcing Malicious Infrastructure to the Cloud

by Georgios Kontaxis, Iasonas Polakis, Sotiris Ioannidis
"... Abstract—Malicious activities, such as running botnets, phishing sites or keyloggers, require an underlying infrastructure for carrying out vital operations like hosting coordination mechanisms or storing stolen information. In the past, attackers have used their own resources or compromised machine ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
of Cloud services in facilitating malicious activities. Finally, we discuss how the nature of the Cloud may shape future security monitoring and enhance defenses against such practices. I.

Dealing with the Malicious Insider

by Andy Jones, Carl Colwill, Dr. Andy Jones, Carl Colwill
"... This paper looks at a number of issues relating to the malicious insider and the nature of motivation, loyalty and the type of attacks that occur. The paper also examines the changing environmental, social, cultural and business issues that have resulted in an increased exposure to the insider threa ..."
Abstract - Add to MetaCart
This paper looks at a number of issues relating to the malicious insider and the nature of motivation, loyalty and the type of attacks that occur. The paper also examines the changing environmental, social, cultural and business issues that have resulted in an increased exposure to the insider

Malicious Membership Queries and Exceptions

by Dana Angluin, Martinch Krikis , 1994
"... We consider two issues in polynomial-time exact learning of concepts using membership and equivalence queries: (1) errors in the answers to membership queries and (2) learning finite variants of concepts drawn from a learnable class. To study (1), we introduce a malicious membership query, in which ..."
Abstract - Cited by 4 (2 self) - Add to MetaCart
We consider two issues in polynomial-time exact learning of concepts using membership and equivalence queries: (1) errors in the answers to membership queries and (2) learning finite variants of concepts drawn from a learnable class. To study (1), we introduce a malicious membership query, in which

Effect of Malicious Synchronization

by Mun Choon Chan, Ee-chien Chang, Liming Lu, Peng Song Ngiam - In Proceedings of te 4 th Applied Cryptography and Network Security Conference (ACNS , 2006
"... Abstract. We study the impact of malicious synchronization on computer systems that serve customers periodically. Systems supporting automatic periodic updates are common in web servers providing regular news update, sports scores or stock quotes. Our study focuses on the possibility of launching an ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Abstract. We study the impact of malicious synchronization on computer systems that serve customers periodically. Systems supporting automatic periodic updates are common in web servers providing regular news update, sports scores or stock quotes. Our study focuses on the possibility of launching

Survey of Malicious Attacks in MANET

by Neha Shrivastava, Anand Motwani
"... A Mobile Ad hoc Network (MANET) is a collection of mobile nodes and is autonomous having communication through the insecure wireless links. The nodes in the network dynamically add and join the network. Due to this kind of nature nodes are vulnerable to various kinds of attacks. There are many threa ..."
Abstract - Add to MetaCart
A Mobile Ad hoc Network (MANET) is a collection of mobile nodes and is autonomous having communication through the insecure wireless links. The nodes in the network dynamically add and join the network. Due to this kind of nature nodes are vulnerable to various kinds of attacks. There are many
Next 10 →
Results 1 - 10 of 849
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University