نتایج جستجو برای: primary user emulation attack

تعداد نتایج: 950393  

2013
Kaigui Bian

dynamic spectrum access (DSA) that promises to alleviate the spectrum shortage problem in wireless networks. By employing spectrum sensing techniques or referring to the geolocation databases, a CR (or a CR-enabled secondary user) is able to intelligently decide which licensed spectrum band is free for use without causing harmful interference to licensed (or primary) users. Besides, the spectru...

Journal: :International Journal of Computer Applications 2013

Journal: :Optics express 2013
Toshimori Honjo Mikio Fujiwara Kaoru Shimizu Kiyoshi Tamaki Shigehito Miki Taro Yamashita Hirotaka Terai Zhen Wang Masahide Sasaki

We propose a countermeasure against the so-called tailored bright illumination attack for differential-phase-shift QKD (DPS-QKD). By monitoring a rate of coincidence detection at a pair of superconducting nanowire single-photon detectors (SSPDs) which is connected at each of the output ports of Bob's Mach-Zehnder interferometer, Alice and Bob can detect and defeat this kind of attack. We also e...

2003
Hideki Eiraku Yasushi Shinjo

A user-level operating system (OS) can be implemented as a regular user process on top of another host operating system. Conventional userlevel OSes, such as User Mode Linux, view the underlying host operating system as a specific hardware architecture. Therefore, the implementation of a user-level OS often requires porting of an existing kernel to a new hardware architecture. This paper propos...

2013
Daljeet Kaur Monika Sachdeva

Distributed Denial of Service (DDoS) attacks is virulent, relatively new type of attacks on the availability of Internet services and resources. DDoS attackers infiltrate large number of computers by exploiting software vulnerabilities, to set up DDoS attack networks. DDoS attacks pose an immense threat to the Internet, therefore some defense systems are required to defend these attacks. In thi...

2014
M. Zahid A. Mezrioui A. Belmekki Chao Li Wei Jiang Xin Zou Daniel Plohmann Elmar Gerhards-Padilla

Network emulation and simulation tools are widely used for preproduction, studies and researches purposes. This success is due to the quality of result they provide compared to the real equipments. Another advantage of the network simulators is that the cost of studies and experiences are exponentially reduced especially for networks that use expensive hardware or a big number of nodes. In the ...

2007
Michalis Polychronakis Kostas G. Anagnostakis Evangelos P. Markatos

Network-level emulation has recently been proposed as a method for the accurate detection of previously unknown polymorphic code injection attacks. In this paper, we extend network-level emulation along two lines. First, we present an improved execution behavior heuristic that enables the detection of a certain class of non-self-contained polymorphic shellcodes that are currently missed by exis...

2006
Tom Dowling Adam Duffy

This paper presents an architecture to assist in the development of tools to perform experimental analysis. Existing implementations of tools based on this architecture are also described in this paper. These tools are applied to the real world problem of fault attack emulation and detection in cryptographic algorithms. Keywords— Software Architectures and Design, Software Components and Reuse,...

2008
Roman Chertov Sonia Fahmy Ness B. Shroff Michael Blodgett Paul Barford Ron Ostrenga Terry Benzel

Chertov, Roman Ph.D., Purdue University, May, 2008. A Device Independent Router Model: From Measurements to Simulations. Major Professors: Sonia Fahmy and Ness B. Shroff. Simulation, emulation, and wide-area testbeds exhibit different tradeoffs with respect to fidelity, scalability, and manageability. Network security and network planning/dimensioning experiments introduce additional requiremen...

2005
Fabrice Bellard

We present the internals of QEMU, a fast machine emulator using an original portable dynamic translator. It emulates several CPUs (x86, PowerPC, ARM and Sparc) on several hosts (x86, PowerPC, ARM, Sparc, Alpha and MIPS). QEMU supports full system emulation in which a complete and unmodified operating system is run in a virtual machine and Linux user mode emulation where a Linux process compiled...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید