Attack ad

Results: 74



#Item
11Social information processing / Node / Sybil attack / Reputation / Computing / Reputation management / Distributed data storage / Reputation system

A Robust Reputation System for P2P and Mobile Ad-hoc Networks Sonja Buchegger EPFL-IC-LCA CH-1015 Lausanne, Switzerland

Add to Reading List

Source URL: www.eecs.harvard.edu

Language: English - Date: 2004-05-28 15:48:54
12Search algorithms / Error detection and correction / Hash function / Information retrieval / Artificial intelligence / SHA-1 / Bloom filter / Sybil attack / Hashing / Cryptography / Cryptographic hash functions

582 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 3, MARCH 2011 P2DAP – Sybil Attacks Detection in Vehicular Ad Hoc Networks

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2012-03-12 23:31:44
13Security / Internet protocols / Internet standards / Secure communication / Man-in-the-middle attack / Public key fingerprint / Public-key cryptography / Authentication / Transport Layer Security / Cryptography / Cryptographic protocols / Computing

Talking To Strangers: Authentication in Ad-Hoc Wireless Networks Dirk Balfanz, D. K. Smetters, Paul Stewart and H. Chi Wong Xerox Palo Alto Research Center 3333 Coyote Hill Road Palo Alto, CAbalfanz,smetters,stewa

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2002-02-11 23:13:47
14NP-complete problems / Wireless sensor network / Distributed data storage / Unit disk graph / Topology control / Routing / Graph / Topology / Connectivity / Graph theory / Theoretical computer science / Mathematics

Wireless Netw:27–59 DOIs11276x A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks Radha Poovendran · Loukas Lazos

Add to Reading List

Source URL: www2.engr.arizona.edu

Language: English - Date: 2007-10-10 03:13:37
15Campaign finance / Attack ad / Citizens United v. Federal Election Commission / Campaign finance reform in the United States / Campaign advertising / Advertising / Fundraising / Political campaign / National Rifle Association / Politics / Lobbying in the United States / Political action committee

PDF Document

Add to Reading List

Source URL: mediaproject.wesleyan.edu

Language: English - Date: 2014-11-17 12:42:00
16Computing / Vehicular ad-hoc network / Mobile ad hoc network / Denial-of-service attack / Ad hoc On-Demand Distance Vector Routing / Wireless ad-hoc network / Transmission Control Protocol / Wireless security / Mesh networking / Wireless networking / Technology / Telecommunications engineering

International Journal of Academic Research in Business and Social Sciences July 2013, Vol. 3, No. 7 ISSN: Minimization of Denial of services attacks in Vehicular Adhoc networking by applying different constrain

Add to Reading List

Source URL: hrmars.com

Language: English - Date: 2013-07-22 21:47:47
17Communication design / Graphic design / Elections in the United States / Attack ad / Business / Campaign advertising / Citizens United v. Federal Election Commission / Independent / Election / Politics / Communication / Advertising

The Informational Content of Campaign Advertising Gregory J. Martin∗ October 24, 2012 Abstract Understanding the mechanisms by which political advertising affects voters is crucial for evaluating the welfare effects of

Add to Reading List

Source URL: www.wallis.rochester.edu

Language: English - Date: 2013-10-21 14:57:51
18Computing / Denial-of-service attack / Malware / Application security / Attack / Vulnerability / Internet security / Bitcoin / Microsoft Security Essentials / Computer network security / Cyberwarfare / Computer security

Infrastructure Security 1. Infrastructure Security The Attackers Behind PlugX In this report, we present survey results and background information on the attackers behind the PlugX

Add to Reading List

Source URL: www.iij.ad.jp

Language: English - Date: 2014-07-01 22:18:06
19Computer security / Denial-of-service attack / Vulnerability / Attack / Malware / Cross-site scripting / Windows / Firefox / Cyberwarfare / Software / Computer network security

Infrastructure Security 1. Infrastructure Security Forward Secrecy In this report, we discuss points to note regarding memory forensics for devices equipped with large amounts

Add to Reading List

Source URL: www.iij.ad.jp

Language: English - Date: 2014-03-27 22:27:18
20Hacking / Computing / Attack / Vulnerability / Zero-day attack / Denial-of-service attack / DNS spoofing / Domain Name System Security Extensions / Internet security / Computer network security / Cyberwarfare / Computer security

I n t e r ne t I n f r a s t r u c t u re Rev i e w Vol.21 Infrastructure Security The PlugX RAT Used in Targeted Attacks

Add to Reading List

Source URL: www.iij.ad.jp

Language: English - Date: 2015-05-20 03:08:08
UPDATE