Results 1 - 10
of
5,248
Survey of Malicious Attacks in MANET
"... A Mobile Ad hoc Network (MANET) is a collection of mobile nodes and is autonomous having communication through the insecure wireless links. The nodes in the network dynamically add and join the network. Due to this kind of nature nodes are vulnerable to various kinds of attacks. There are many threa ..."
Abstract
- Add to MetaCart
A Mobile Ad hoc Network (MANET) is a collection of mobile nodes and is autonomous having communication through the insecure wireless links. The nodes in the network dynamically add and join the network. Due to this kind of nature nodes are vulnerable to various kinds of attacks. There are many
A Glance At Malicious Attacks In Web
"... Abstract—Web usage is one of the great important to all users in this era. For each and every need internet or web is made use of. Users make use of the area as a medium for searching information, performing business transactions, and also for entertainment. It serves as an attractive area for attac ..."
Abstract
- Add to MetaCart
for attackers too. Hence there is at most importance to protect our data that is being exposed in web against any sort of malicious attacks. Malware, short for malicious software is a software use to disrupt computer operation, gathers sensitive information or gain access to pri vate computer system. It can
Recovering from Malicious Attacks in Workflow Systems
- In Proceedings of the Sixteenth International Conference on Database and Expert Systems
, 2005
"... zhuy,xin,iray¡ Abstract. Workflow management systems (WFMS) coordinate execution of logically related multiple tasks in an organization. Such coordination is achieved through dependencies that are specified between the tasks of a workflow. Often times preventive measures are not enough and a workflo ..."
Abstract
-
Cited by 3 (3 self)
- Add to MetaCart
workflow may be subjected to malicious attacks. Traditional workflow recovery mechanisms do not address how to recover from malicious attacks. Database survivability techniques do not work for workflow because tasks in a workflow have dependencies that are not present in traditional transaction processing
Prevention and detection of malicious attacks and prevention of provenance forgery
, 2017
"... ABSTRACT Number of users are present in a network. Different malicious activities are performed on the data that is being transmitted over a network.The malicious attacks may delete or modify the data. they may also change the destination of the file to be sent. This system is mainly dseigned to de ..."
Abstract
- Add to MetaCart
ABSTRACT Number of users are present in a network. Different malicious activities are performed on the data that is being transmitted over a network.The malicious attacks may delete or modify the data. they may also change the destination of the file to be sent. This system is mainly dseigned
Spread Spectrum Watermarking: Malicious Attacks and Counterattacks
, 1999
"... Most watermarking methods for images and video have been proposed are based on ideas from spread spectrum radio communications, namely additive embedding of a (signal adaptive or non-adaptive) pseudo-noise watermark pattern, and watermark recovery by correlation. Even methods that are not presented ..."
Abstract
-
Cited by 82 (10 self)
- Add to MetaCart
as spread spectrum methods often build on these principles. Recently, some scepticism about the robustness of spread spectrum watermarks has arisen, specifically with the general availability of watermark attack software which claim to render most watermarks undetectable. In fact, spread spectrum watermarks
Refining Anomalistic Malicious Attacks in Sovereign Setup
"... Abstract — Internet is a widely used technology, globally interconnected networks with the use of standard Internet protocols (IP) to aid abundance of users across the globe. Recently, Internet is afflicted by malicious actions such as spam, phishing to malware, denial-of-service (DoS), Man in the m ..."
Abstract
- Add to MetaCart
in the middle attack, Eavesdropping attacks etc. Much of it’s prospered enemies on attack of compromised hosts, which are scattered throughout the IP networks and starts intruding the network. Malicious activity is not necessarily to be uniformly distributed across the Internet: some networks may occupy lax
Monitoring and Diagnosing Malicious Attacks with Autonomic Software
- Proceedings 28th International Conference on Conceptual Modeling (ER’09
, 2009
"... Abstract. Monitoring and diagnosing (M&D) software based on re-quirement models is a problem that has recently received a lot of at-tention in field of Requirement Engineering. In this context, Wang et al. [1] propose a M&D framework that uses goal models to diagnose fail-ures in software at ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
at different levels of granularity. In this paper we extend Wang’s framework to monitor and diagnose malicious attacks. Our ex-tensions include the addition of anti-goals to model attacker intentions, as well as context-based modeling of the domain within which our system operates. The extended framework has
EA Optimization of Networks Against Malicious Attacks
"... Abstract. The importance of considering the network structure in studying the behavior of many modern infrastructures and naturally occurring complex systems, has become increasingly clear. The topology of many real world networks makes them vulnerable with respect to targeted attacks on their compo ..."
Abstract
- Add to MetaCart
. Similar work exists with trajectory-based meta-heuristics and has shown that this method can largely improve the robustness of a given network. Here we present the first attempt at optimizing networks against malicious attacks using an evolutionary algorithm, and show that one can achieve significantly
Malicious attacks on ad hoc network routing protocols
"... The main purpose of an ad hoc network routing protocol is to enable the transport of data packets from one point to another. This paper examines the potential attacks on this transport service which arise from the realisation of threats from internal malicious nodes. The prerequisite of a routing se ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
The main purpose of an ad hoc network routing protocol is to enable the transport of data packets from one point to another. This paper examines the potential attacks on this transport service which arise from the realisation of threats from internal malicious nodes. The prerequisite of a routing
Results 1 - 10
of
5,248