Learn More
Mobile handhelds with wireless access are used in numerous safety critical applications. The wireless network protocols in use are vulnerable to a wide array of denial of service attacks. We propose a formal method for modeling semantic denial of service attacks against wireless network protocols. We then use our proposed model to find a new deadlock(More)
Use of intermediary hosts as stepping stones to conceal tracks is common in Internet misuse. It is therefore desirable to find a method to detect whether the originating party is using an intermediary host. Such a detection technique would allow the activation of a number of countermeasures that would neutralize the effects of misuse, and make it easier to(More)
  • 1