Výsledky vyhledávání - "algorithmic complexity attacks"
-
1
Autoři: a další
Zdroj: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security. :497-510
Témata: FOS: Computer and information sciences, Computer Science - Cryptography and Security, Cryptography and Security (cs.CR)
Přístupová URL adresa: http://arxiv.org/abs/2406.03133
-
2
Zdroj: Encyclopedia of Cryptography, Security and Privacy ISBN: 9783030715205
-
3
Autoři: a další
Přístupová URL adresa: http://arxiv.org/abs/2507.07438
-
4
Autoři:
Zdroj: Proceedings of the VLDB Endowment. 17:780-793
Témata: FOS: Computer and information sciences, Computer Science - Cryptography and Security, Computer Science - Databases, 0202 electrical engineering, electronic engineering, information engineering, Databases (cs.DB), 0102 computer and information sciences, 02 engineering and technology, Cryptography and Security (cs.CR), 01 natural sciences
Přístupová URL adresa: http://arxiv.org/abs/2403.12433
-
5
-
6
-
7
Autoři: a další
Zdroj: Proceedings of the ACM SIGCOMM 2022 Conference. :723-738
-
8
Autoři:
Zdroj: Theoretical Computer Science. 1014:114762
-
9
Autoři: a další
Zdroj: 2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom). :751-758
-
10
Autoři: a další
Zdroj: IEEE/ACM Transactions on Networking
Témata: 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
Přístupová URL adresa: https://dblp.uni-trier.de/db/journals/ton/ton24.html#AfekBHHK16
https://dl.acm.org/doi/10.1109/TNET.2016.2518712
https://doi.org/10.1109/TNET.2016.2518712
http://ieeexplore.ieee.org/document/7393623/
https://ieeexplore.ieee.org/document/7393623/
https://scholar.princeton.edu/ykoral/publications/making-dpi-engines-resilient-algorithmic -complexity -attacks -
11
Autoři:
Zdroj: 2016 IEEE Symposium on Visualization for Cyber Security (VizSec). :1-8
Témata: 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
-
12
Autoři: a další
Přispěvatelé: a další
Zdroj: Recercat. Dipósit de la Recerca de Catalunya
instname
UPCommons. Portal del coneixement obert de la UPC
Universitat Politècnica de Catalunya (UPC)Témata: Intrusion detection systems (Computer security), Ordinadors, Xarxes d' -- Mesures de seguretat, Informàtica::Seguretat informàtica [Àrees temàtiques de la UPC], Computer networks -- Security measures, Intrusion detection systems, 0202 electrical engineering, electronic engineering, information engineering, Defense mechanisms, Hardware support, 02 engineering and technology, Àrees temàtiques de la UPC::Informàtica::Seguretat informàtica
Popis souboru: application/pdf
Přístupová URL adresa: http://hdl.handle.net/2117/19426
https://dblp.uni-trier.de/db/conf/ipps/ipdps2012w.html#ShenoyTG12
http://ieeexplore.ieee.org/document/6270773/
http://yadda.icm.edu.pl/yadda/element/bwmeta1.element.ieee-000006270773
https://upcommons.upc.edu/handle/2117/19426
http://www.research.ed.ac.uk/portal/en/publications/hardwaresoftware-mechanisms-for-protecting-an-ids-against-algorithmic -complexity -attacks (ae7713a3-b211-44d3-bdda-b2381edb216d).html
https://www.research.ed.ac.uk/portal/en/publications/hardwaresoftware-mechanisms-for-protecting-an-ids-against-algorithmic -complexity -attacks (ae7713a3-b211-44d3-bdda-b2381edb216d).html
https://hdl.handle.net/2117/19426
https://doi.org/10.1109/ipdpsw.2012.145 -
13
Autoři:
Zdroj: 2006 22nd Annual Computer Security Applications Conference (ACSAC'06). :89-98
Témata: 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
Přístupová URL adresa: http://cs.wisc.edu/~estan/publications/bt-attack.pdf
https://www.computer.org/csdl/proceedings-article/acsac/2006/27160089/12OmNwc3wzr
https://ieeexplore.ieee.org/document/4041157/
http://www.acsac.org/2006/papers/54.pdf
https://www.cs.auckland.ac.nz/~mcw/Teaching/refs/algo-complexity -attacks /nids.pdf
http://yadda.icm.edu.pl/yadda/element/bwmeta1.element.ieee-000004041157
https://www.acsac.org/2006/papers/54.pdf -
14
Autoři:
Zdroj: 2011 IEEE International Conference on Communications (ICC). :1-5
Témata: 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
-
15
Autoři:
Zdroj: 2009 30th IEEE Symposium on Security and Privacy. :27-41
Témata: 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
Přístupová URL adresa: https://ieeexplore.ieee.org/document/5207635/
https://dblp.uni-trier.de/db/conf/sp/sp2009.html#CaiGJ09
http://www.cse.psu.edu/~trj1/cse598-f11/docs/cai_oakland09_races2.pdf
https://doi.org/10.1109/SP.2009.10
https://doi.ieeecomputersociety.org/10.1109/SP.2009.10
http://yadda.icm.edu.pl/yadda/element/bwmeta1.element.ieee-000005207635 -
16
Zdroj: Proceedings of the Second International Conference on Security and Cryptography. :117-124
-
17
Autoři:
Zdroj: Communications in Computer and Information Science ISBN: 9783540886525
Přístupová URL adresa: https://link.springer.com/chapter/10.1007/978-3-540-88653-2_12
https://www.eng.tau.ac.il/~yash/C2_039_Wool.pdf
https://dblp.uni-trier.de/db/conf/secrypt/secrypt2007.html#Bar-YosefW07
https://rd.springer.com/chapter/10.1007/978-3-540-88653-2_12
http://ui.adsabs.harvard.edu/abs/2009ebt..conf..162B/abstract -
18
Zdroj: Encyclopedia of Cryptography and Security ISBN: 9781441959058
-
19
Autoři:
Zdroj: Lecture Notes in Computer Science ISBN: 9783540266136
-
20
Autoři: a další
Témata: Àrees temàtiques de la UPC::Informàtica::Seguretat informàtica, Computer networks -- Security measures, Intrusion detection systems (Computer security), Defense mechanisms, Hardware support, Intrusion detection systems, Ordinadors, Xarxes d' -- Mesures de seguretat, Conference report
Nájsť tento článok vo Web of Science
Full Text Finder