Parcourir par sujet "Computer crime"
Voici les éléments 1-7 de 7
-
Impact of optimal MAC layer attacks on the network layer
(2006)Node misbehavior in wireless ad hoc networks leads to sudden unpredictable changes in network topology, resulting in fluctuation of traffic load and capacity for already existing links. In this work we consider node ... -
Intrusion detection system for platooning connected autonomous vehicles
(2019)The deployment of Connected Autonomous Vehicles (CAVs) in Vehicular Ad Hoc Networks (VANETs) requires secure wireless communication in order to ensure reliable connectivity and safety. However, this wireless communication ... -
Network threat analysis
(2019)This chapter will share some key results from the SAINT project starting with an overview of the people who form the cybercrime network including attackers, victims and the organisations who are attempting to protect them. ... -
Optimal jamming attack strategies and network defense policies in wireless sensor networks
(2010)We consider a scenario where a sophisticated jammer jams an area in which a single-channel random-access-based wireless sensor network operates. The jammer controls the probability of jamming and the transmission range in ... -
Real-life paradigms of wireless network security attacks
(2011)Wirelesses Local Area Networks (WLANs) have become more prevalent and are widely deployed in many popular places like university campuses, cafés, airports, residences, etc. However, WLAN security is a very important but ... -
A test-bed for intrusion detection systems results post-processing
(2014)Intrusion detection systems produce alert sets of low quality. Many post-processing methods have been proposed to make alert sets more meaningful to security analysts. Relevant research has to deal with an important task; ... -
Using homomorphic encryption for privacy-preserving clustering of intrusion detection alerts
(2021)Cyber-security attacks are becoming more frequent and more severe day by day. To detect the execution of such attacks, organizations install intrusion detection systems. It would be beneficial for such organizations to ...