-
1
-
-
70350212888
-
WiMAX security for real-world network service provider deployments
-
Motorola Inc
-
Motorola Inc. WiMAX security for real-world network service provider deployments. White Paper, 2007.
-
(2007)
White Paper
-
-
-
2
-
-
31344451091
-
Security vulnerabilities: From analysis to detection and masking techniques (invited paper). In Proceedings of the IEEE, Vol
-
Chen S, Xu J, Kalbarczyk Z, Iyer R. Security vulnerabilities: from analysis to detection and masking techniques (invited paper). In Proceedings of the IEEE, Vol. 94, Issue 2, February 2006.
-
(2006)
94, Issue
, pp. 2
-
-
Chen, S.1
Xu, J.2
Kalbarczyk, Z.3
Iyer, R.4
-
5
-
-
84947615185
-
-
http://www.sans.org/reading room/whitepapers/vpns/the_daydes_died_722
-
-
-
-
6
-
-
33750365498
-
Understanding the network-level behavior of spammers
-
Ramachandran A, Feamster N. Understanding the network-level behavior of spammers. In ACM SIGCOMM, Vol. 36, 2006.
-
(2006)
ACM SIGCOMM
, pp. 36
-
-
Ramachandran, A.1
Feamster, N.2
-
7
-
-
0742276097
-
Inside the slammer worm
-
Moore D, Paxson V, Savage S, Shannon C, Staniford S, Weaver N. Inside the slammer worm. IEEE Security and Privacy Journal 2003; 1: 33-39.
-
(2003)
IEEE Security and Privacy Journal
, vol.1
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
8
-
-
0042536226
-
Code-red: A case study on the spread and victims of an Internet worm
-
Moore D, Shannon C, Brown J. Code-red: a case study on the spread and victims of an Internet worm. In ACM/USENIX IMW, 2002.
-
(2002)
ACM/USENIX IMW
-
-
Moore, D.1
Shannon, C.2
Brown, J.3
-
11
-
-
84947616391
-
-
http://www.dshield.org/
-
-
-
-
14
-
-
51649125749
-
Security considerations for handover schemes in mobile WiMAX networks
-
Hur J, Shim H, Kim P, Yoon H, Song N. Security considerations for handover schemes in mobile WiMAX networks. In IEEE WCNC, 2008.
-
(2008)
IEEE WCNC
-
-
Hur, J.1
Shim, H.2
Kim, P.3
Yoon, H.4
Song, N.5
-
15
-
-
0030715989
-
Analysis of a denial of service attack on TCP
-
Schuba CL, Krsul IV, Kuhn MG, Spafford EH, Sundaram A, Zamboni D. Analysis of a denial of service attack on TCP. In IEEE Symposium on Security and Privacy, 1997.
-
(1997)
IEEE Symposium on Security and Privacy
-
-
Schuba, C.L.1
Krsul, I.V.2
Kuhn, M.G.3
Spafford, E.H.4
Sundaram, A.5
Zamboni, D.6
-
17
-
-
0842289243
-
Detection of invalid routing announcements in the RIP protocol
-
Pei D, Massey D, Zhang L. Detection of invalid routing announcements in the RIP protocol. In GLOBECOM, 2003.
-
(2003)
GLOBECOM
-
-
Pei, D.1
Massey, D.2
Zhang, L.3
-
21
-
-
84885890388
-
A stochastic modeling of coordinated internal and external attacks
-
Technical Report. Available at
-
Li X, Xu S. A stochastic modeling of coordinated internal and external attacks. Technical Report. Available at: http://www.cs.utsa.edu/shxu/collaborative-attack-model.pdf
-
-
-
Li, X.1
Xu, S.2
-
27
-
-
3042575523
-
Coordinated internet attacks: Responding to attack complexity
-
Ourston D, Matzner S, Stump W, Hopkins B. Coordinated internet attacks: responding to attack complexity. Journal of Computer Security 2004; 12(2): 165-190.
-
(2004)
Journal of Computer Security
, vol.12
, Issue.2
, pp. 165-190
-
-
Ourston, D.1
Matzner, S.2
Stump, W.3
Hopkins, B.4
-
29
-
-
70350230489
-
IEEE standard for local and metropolitan area networks part 16: Air interface for fixed broadband wireless access systems
-
The Institute of Electrical and Electronics Engineers
-
The Institute of Electrical and Electronics Engineers. IEEE standard for local and metropolitan area networks part 16: air interface for fixed broadband wireless access systems. IEEE Std 802.16-2004, IEEE, 2004.
-
(2004)
IEEE Std 802.16-2004, IEEE
-
-
-
30
-
-
84947611219
-
-
http://wirelessman.org/relay/
-
-
-
-
31
-
-
84947612010
-
Harmonized contribution on 802.16j (mobile multihop relay) usage models
-
Sydir J. Harmonized contribution on 802.16j (mobile multihop relay) usage models. IEEE 802.16j task group, 2006.
-
(2006)
IEEE 802.16j task group
-
-
Sydir, J.1
-
32
-
-
70350219039
-
Effect of cooperative black hole attack on mobile ad hoc networks
-
Ramaswamy S, Fu H, Nygard K. Effect of cooperative black hole attack on mobile ad hoc networks. In ICWN, 2005.
-
(2005)
ICWN
-
-
Ramaswamy, S.1
Fu, H.2
Nygard, K.3
-
33
-
-
33745403778
-
Defending against wormhole attacks in mobile ad hoc networks
-
Issue, June
-
Wang W, Bhargava B, Lu Y, Wu X. Defending against wormhole attacks in mobile ad hoc networks. In WCMC, Vol. 6, Issue 4, June 2006; 483-503.
-
(2006)
WCMC
, vol.6
, Issue.4
, pp. 483-503
-
-
Wang, W.1
Bhargava, B.2
Lu, Y.3
Wu, X.4
-
34
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
-
Hu Y-C, Perrig A, Johnson DB. Packet leashes: a defense against wormhole attacks in wireless ad hoc networks. In IEEE INFO- COM, 2003.
-
(2003)
IEEE INFO- COM
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
37
-
-
84947618732
-
-
http://wirelessman.org/le/contrib/C80216h-05 045.pdf
-
-
-
-
38
-
-
84947613041
-
Unlicensed operation Of IEEE 802.16: Coex-istance with 802.11(A)
-
Berlemann L. Unlicensed operation Of IEEE 802.16: coex-istance with 802.11(A) In Shared Frequency Bands, PIMRC, 2006.
-
(2006)
Shared Frequency Bands, PIMRC
-
-
Berlemann, L.1
-
40
-
-
84947614145
-
-
Nessus Security Scanner, Available at
-
Nessus Security Scanner. Available at: http://www.nessus.org, 2008.
-
(2008)
-
-
-
41
-
-
84947618363
-
-
Security Administrator Tool for Analyzing Networks (SATAN), Available at:, June
-
Security Administrator Tool for Analyzing Networks (SATAN). Available at: http://www.porcupine.org/satan, June 2008.
-
(2008)
-
-
-
42
-
-
84947613944
-
-
Computer Emergency Response Team (CERT), Available at
-
Computer Emergency Response Team (CERT). Available at: http://www.cert.org/, 2009.
-
(2009)
-
-
-
43
-
-
84947617106
-
-
NIST's National Vulnerability Database. Available at
-
NIST's National Vulnerability Database. Available at: http://nvd.nist.gov, 2009.
-
(2009)
-
-
-
44
-
-
20444480299
-
Jajodia S. Managing attack graph complexity through visual hierarchical aggregation. In Proceedings of the
-
Noel S, Jajodia S. Managing attack graph complexity through visual hierarchical aggregation. In Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Secu- rity, 2004; 109-118.
-
(2004)
ACM Workshop on Visualization and Data Mining for Computer Security
, vol.2004
, pp. 109-118
-
-
Noel, S.1
Jajodia, S.2
-
48
-
-
84988504967
-
A graph-based system for network- vulnerability analysis
-
ACM, New York, NY, USA
-
Phillips C, Swiler LP. A graph-based system for network- vulnerability analysis. In NSPW'98: Proceedings of the 1998 Workshop on New Security Paradigms, ACM, New York, NY, USA, 1998; 71-79.
-
(1998)
NSPW'98: Proceedings of the 1998 Workshop on New Security Paradigms
, pp. 71-79
-
-
Phillips, C.1
Swiler, L.P.2
-
49
-
-
0036083194
-
Automated generation and analysis of attack graphs
-
Sheyner O, Haines J, Jha S, Lippmann R, Wing JM. Automated generation and analysis of attack graphs. In IEEE Symposium on Security and Privacy, 2002; 273-284.
-
(2002)
IEEE Symposium on Security and Privacy
, pp. 273-284
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.M.5
-
52
-
-
24944500947
-
Risk management using behavior based bayesian networks. Intelligence and Security Informatics
-
Dantu R, Kolan P. Risk management using behavior based bayesian networks. Intelligence and Security Informatics, LNCS, Vol. 3495, 2005; 115-126.
-
(2005)
LNCS
, vol.3495
, pp. 115-126
-
-
Dantu, R.1
Kolan, P.2
-
55
-
-
37849021677
-
Measuring overall security of network configurations using attack graphs
-
Wang L, Singhal A, Jajodia S. Measuring overall security of net- work configurations using attack graphs. Data and Applications Security XXI, Vol. 4602, August 2007; 98-112.
-
(2007)
Data and Applications Security XXI
, vol.4602
, pp. 98-112
-
-
Wang, L.1
Singhal, A.2
Jajodia, S.3
-
58
-
-
0020782217
-
A causal model for analyzing distributed concurrency control algorithms
-
Bhargava B, Hua C. A causal model for analyzing distributed concurrency control algorithms. IEEE Transactions on Software Engineering 1983; 9(4): 470-486.
-
(1983)
IEEE Transactions on Software Engineering
, vol.9
, Issue.4
, pp. 470-486
-
-
Bhargava, B.1
Hua, C.2
-
59
-
-
84947617600
-
-
http://www.ssfnet.org/homePage.html
-
-
-
|