Evaluating a Dynamic Internet Threat Monitoring Method for Preventing PN Code-Based Localization Attack
暂无分享,去创建一个
[1] Yoichi Shinoda,et al. Vulnerabilities of Passive Internet Threat Monitors , 2005, USENIX Security Symposium.
[2] Mary K. Vernon,et al. Mapping Internet Sensors with Probe Response Attacks , 2005, USENIX Security Symposium.
[3] Toyoo Takata,et al. A practical study on noise-tolerant PN code-based localisation attacks to internet threat monitors , 2013, Int. J. Space Based Situated Comput..
[4] Shinoda Yoichi,et al. The Statistical Protection for Internet Threat Monitors , 2005 .
[5] Xun Wang,et al. An Invisible Localization Attack to Internet Threat Monitors , 2009, IEEE Transactions on Parallel and Distributed Systems.
[6] L. Jean Camp,et al. A Risk Based Approach to Limit the Effects of Covert Channels for Internet Sensor Data Aggregators for Sensor Privacy , 2009, IFIPTM.
[7] Koji Nakao,et al. nicter: a large-scale network incident analysis system: case studies for understanding threat landscape , 2011, BADGERS '11.
[8] Yoshioka Katsunari,et al. NONSTOP: Secure Remote Analysis Platform for Cybersecurity Information , 2013 .
[9] Vinod Yegneswaran,et al. Honeynet games: a game theoretic approach to defending network monitors , 2011, J. Comb. Optim..
[10] Riccardo Bettati,et al. Localization Attacks to Internet Threat Monitors: Modeling and Countermeasures , 2010, IEEE Transactions on Computers.
[11] A. Rama Mohan Reddy,et al. Flooding attacks to internet threat monitors (ITM): Modeling and counter measures using botnet and honeypots , 2012, ArXiv.
[12] Jiang Wu,et al. Effective worm detection for various scan techniques , 2006, J. Comput. Secur..