نتایج جستجو برای: primary user emulation attack

تعداد نتایج: 950393  

Journal: :IJDC 2010
Kam Woods Geoffrey Brown

Emulation is frequently discussed as a failsafe preservation strategy for born-digital documents that depend on contemporaneous software for access (Rothenberg, 2000). Yet little has been written about the contextual knowledge required to successfully use such software. The approach we advocate is to preserve necessary contextual information through scripts designed to control the legacy enviro...

2013
Ruhul Amin Tanmoy Maitra Debasis Giri

In a single server environment, one server is responsible for providing services to all the authorized remote users. However, the problem arises if a user wishes to access several network services. To overcome this weakness, various multi-server authentication schemes have been proposed. In 2012, Taygi et al. [1] proposed a scheme for multi-server environment. But it is found that their propose...

2011
Mürsel Yildiz Ahmet Cihat Toker Fikret Sivrikaya Seyit Ahmet Çamtepe Sahin Albayrak

The IEEE Wireless LAN standard has been a true success story by enabling convenient, efficient and low-cost access to broadband networks for both private and professional use. However, the increasing density and uncoordinated operation of wireless access points, combined with constantly growing traffic demands have started hurting the users’ quality of experience. On the other hand, the emergin...

2007
Julie Doyle Herna L. Viktor Eric Paquet

The issue of long term preservation of digital data has, in recent years, become a critical issue with many diverse groups and organisations recognising the need to preserve digital documents before they fall victim to digital obsolescence. However, there is a distinct lack of discussion regarding the needs of future end users of such preserved documents. This is surprising, given that it is th...

2003
Trong-Yen Lee Pao-Ann Hsiung I-Mu Wu Feng-Shi Su

In this work, we propose a complete methodology called RESS (Real-Time Embedded Software Synthesis) for the automatic design of real-time embedded software. Several issues are solved, including software synthesis, software verification, code generation, graphic user interface, and system emulation. To avoid design errors, a formal approach is adopted because glitches in real-time embedded softw...

2007
Deepak Dayama

The Adventium Labs Embedded Distributed Firewall provides a simple interface for securely managing approved network flows between computers on a network. A “conversation” manager provides a simple interface for managing flows, defining the connections authorized between nodes on a network. These policies are enforced in hardware embedded in the network interface card of each computer. The polic...

Journal: :CoRR 2015
Stuart Marsden Jouko Vankka

This paper discusses the implementation of a tactical network simulation tool. The tool is called Tactical Network Modeller (TNM). TNM uses some novel techniques to simplify the building of the network model using graph theory constrained by a hierarchical tree which reflects the organisation structure. TNM allows models to be constructed using an Application Programming Interface (API) or a no...

2012
Zhui Deng Dongyan Xu Xiangyu Zhang Xuxiang Jiang

Dynamic malware analysis aims at revealing malware’s runtime behavior. To evade analysis, advanced malware is able to detect the underlying analysis tool (e.g., one based on emulation.) On the other hand, existing malware-transparent analysis tools incur significant performance overhead, making them unsuitable for live malware monitoring and forensics. In this paper, we present IntroLib, a prac...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید