Skip to main content
    • by 
    •   7  
      DoS AttackCryptographyProtocolsInternet
Data security plays a crucial role in healthcare monitoring systems, since critical patient information is transacted over the Internet, especially through wireless devices, wireless routes such as optical wireless channels, or optical... more
    • by 
    •   6  
      Optical NetworksComputationHealthcare monitoringvpn Security
Despite a plethora of research in the area, none of the mechanisms proposed so far for Denial-of-Service (DoS) mitigation has been widely deployed. We argue in this paper that these deployment difficulties are primarily due to economic... more
    • by 
    •   11  
      BusinessNetwork SecuritySocial WelfareVirtual Private Network
    • by 
    •   14  
      EngineeringTechnologySignal ProcessingNetwork Security
    • by 
    •   14  
      Competitive IntelligenceDynamic Spectrum AccessCognitive radioSystem Design
The 4-way Wi-Fi handshake is used to negotiate fresh pairwise keys, and authenticates both the client and Access Point (AP). We analyze this handshake, and discover several new denial-of-service (DoS) attacks against it. Interestingly,... more
    • by 
    •   5  
      Wi-FiNetwork Protocols802.11Denial of Service Attacks
    • by 
    •   12  
      Network SecurityComputer NetworksNeural NetworkIntrusion Detection
We describe Just Fast Keying (JFK), a new key-exchange protocol, primarily designed for use in the IP security architecture. It is simple, efficient, and secure; we sketch a proof of the latter property. JFK also has a number of novel... more
    • by 
    •   12  
      Information SystemsComputer ScienceDistributed Denial of Service AttackCryptography
Data security plays a crucial role in healthcare monitoring systems, since critical patient information is transacted over the Internet, especially through wireless devices, wireless routes such as optical wireless channels, or optical... more
    • by 
    •   8  
      Computer ScienceOptical NetworksComputationComput
    • by  and +2
    •   8  
      Computer ScienceObject Oriented ProgrammingProtocolsAvailability
    • by 
    •   9  
      Distributed ComputingWireless Sensor NetworksSensor NetworkWireless Sensor
    • by 
    •   20  
      Computer ArchitectureCancerPervasive ComputingCryptography
    • by 
    •   14  
      EngineeringTechnologySignal ProcessingNetwork Security
ABSTRACT Denial of Service (DoS) attacks evolved and consolidated as severe security threats to network servers, not only for Internet Service Providers but also for governments. Earlier DoS attacks involved high-bandwidth flood-based... more
    • by 
    •   3  
      Computer ScienceTaxonomyDenial of Service Attacks
Countermeasures against denial of service attacks and node misbehaviour are mandatory requirements in MANET. Essential network operations assuring basic connectivity can be heavily jeopardized by nodes that do not properly execute their... more
    • by 
    •   5  
      Mobile Ad Hoc NetworksMobile Ad Hoc NetworkRrDenial of Service Attack
Networks are prone to security attacks, and wireless infrastructure network is more vulnerable. The number of people preferring Wireless networks compared to the wired network has seen an expansion of user base owing to the fast and easy... more
    • by 
    •   5  
      IEEE 802.11 WLANWlanAccess PointDenial of Service Attacks
Countermeasures against node misbehavior and selfishness are mandatory requirements in mobile ad hoc networks. Selfishness that causes lack of node activity cannot be solved by classical security means that aim at verifying the... more
    • by 
    •   5  
      Computer ScienceSimulationMobile Ad Hoc NetworkTheoretical Analysis
    • by 
    •   6  
      Wireless Sensor NetworksEnergy efficiencyLower BoundEnergy Efficiency
    • by 
    •   14  
      EngineeringTechnologySignal ProcessingNetwork Security
    • by 
    •   18  
      Distributed ComputingDoS AttackDistributed SystemDistributed Systems
    • by 
    •   9  
      HistoryCloud ComputingAuthenticationIEEE
    • by 
    •   14  
      EngineeringTechnologySignal ProcessingNetwork Security
    • by 
    •   12  
      DoS AttackExperimental ResearchSampling methodsAssembly
    • by 
    •   20  
      Computer ArchitectureCancerPervasive ComputingCryptography
    • by 
    •   14  
      Computer ScienceDistributed ComputingInformation RetrievalPublishing
Data security plays a crucial role in healthcare monitoring systems, since critical patient information is transacted over the Internet, especially through wireless devices, wireless routes such as optical wireless channels, or optical... more
    • by 
    •   8  
      Computer ScienceOptical NetworksComputationComput
Countermeasures against node misbehavior and selfishness are mandatory requirements in mobile ad hocnetworks. Selfishness that causes lack of node activity cannot be solved by classical security means that aim at verifyingthe correctness... more
    • by 
    •   4  
      Computer ScienceSimulationMobile Ad Hoc NetworkDenial of Service Attacks
Data security plays a crucial role in healthcare monitoring systems, since critical patient information is transacted over the Internet, especially through wireless devices, wireless routes such as optical wireless channels, or optical... more
    • by 
    •   8  
      Computer ScienceOptical NetworksComputationComput
    • by 
    •   3  
      Role Based Access ControlDenial of Service AttacksDistributed Systems Security
Data security plays a crucial role in healthcare monitoring systems, since critical patient information is transacted over the Internet, especially through wireless devices, wireless routes such as optical wireless channels, or optical... more
    • by 
    •   5  
      Optical NetworksHealthcare monitoringvpn SecurityDenial of Service Attacks
    • by 
    •   9  
      Distributed ComputingTime SeriesStatistical AnalysisAnomaly Detection
Recently, several papers have studied the possibility of shrinking buffer sizes in Internet core routers to just a few dozen packets under certain constraints. If proven right, these results can open doors to building all-optical routers,... more
    • by 
    •   9  
      Computer ScienceDoS AttackDegradationThroughput
Intrusion prevention systems (IPSs) have become widely recognized as a powerful tool and an important element of IT security safeguards. Essential to every network intrusion prevention system is the ability to search through packets and... more
    • by 
    •   17  
      Computer ArchitectureComputer NetworksCryptographyDatabases