Showing 41 - 50 of 7,217
Internet worm attacks have become increasingly more frequent and have had a major impact on the economy, making the detection and prevention of these attacks a top security concern. Several countermeasures have been proposed and evaluated in recent literature. However, the eect of these proposed...
Persistent link: https://www.econbiz.de/10009475736
Criminals use the anonymity and pervasiveness of the Internet to commit fraud, extortion, and theft. Botnets are used as the primary tool for this criminal activity. Botnets allow criminals to accumulate and covertly control multiple Internet-connected computers. They use this network of...
Persistent link: https://www.econbiz.de/10009476126
Recent supply chain reengineering efforts have focused on integrating firms' production, inventory and replenishment activities with the help of communication networks. While communication networks and supply chain integration facilitate optimization of traditional supply chain functions, they...
Persistent link: https://www.econbiz.de/10009459121
The Payment Card Industry Data Security Standard is a set of twelve security requirements applicable to all institutions and systems handling, storing or transmitting cardholder information. It was created by the main card brands in a united effort to respond to the increasing number of attacks...
Persistent link: https://www.econbiz.de/10009459180
This research involves the design, development, and theoretical demonstration of models resulting in integrated misbehavior resolution protocols for ad hoc networked devices. Game theory was used to analyze strategic interaction among independent devices with conflicting interests. Packet...
Persistent link: https://www.econbiz.de/10009460501
Wireless ad-hoc networks consist of devices communicating with each other without the need for a management infrastructure. As such, the very basic operation of ad-hoc networks is dependent on the cooperation of their nodes to provide connectivity and communication routes. In practice though,...
Persistent link: https://www.econbiz.de/10009481931
Each year, large amounts of money and labor are spent on patching the vulnerabilities in operating systems and various popular software to prevent exploitation by worms. Modeling the propagation process can help us to devise effective strategies against those worms' spreading. This paper...
Persistent link: https://www.econbiz.de/10009483723
Intrusion detection systems (IDSs) are important components of network security. However, it is well known that current IDSs generate large amount of alerts, including both true and false alerts. Other than proposing new techniques to detect intrusions without such problems, this thesis presents...
Persistent link: https://www.econbiz.de/10009431185
Persistent link: https://www.econbiz.de/10011483969
Persistent link: https://www.econbiz.de/10011507997