Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,935,571 papers from all fields of science
Search
Sign In
Create Free Account
Attack patterns
In computer science, attack patterns are a group of rigorous methods for finding bugs or errors in code related to computer security. Attack patterns…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
21 relations
Authentication
Buffer overflow
Class diagram
Common Vulnerabilities and Exposures
Expand
Broader (1)
Software testing
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Integrated System for Malicious Node Discovery and Self-destruction in Wireless Sensor Networks
M. Plastoi
,
O. Banias
,
D. Curiac
,
C. Voloşencu
,
Roxana Tudoroiu
,
A. Doboli
arXiv.org
2018
Corpus ID: 51921140
With the tremendous advances of the wireless devices technology, securing wireless sensor networks became more and more a vital…
Expand
2017
2017
A System for Detecting Targeted Cyber-Attacks Using Attack Patterns
I. Herwono
,
F. El-Moussa
International Conference on Information Systems…
2017
Corpus ID: 52082170
Detecting multi-stage cyber-attacks remains a challenge for any security analyst working in large corporate environments…
Expand
2014
2014
Network Based Intrusion Detection Using Honey pot Deception
Dr. K. V. Kulhalli
,
S. R. Khot
2014
Corpus ID: 212442290
_
2012
2012
Automating Threat Modeling through the Software Development Life-Cycle
Guifré Ruiz
,
E. Heymann
,
Eduardo C´esar
,
B. Miller
2012
Corpus ID: 14252675
— Fixing software security issues early in the development life-cycle reduces its cost dramatically. Companies doing software…
Expand
Review
2009
Review
2009
Early Warning and Intrusion Detection based on Combined AI Methods
S. Edelkamp
,
Carsten Elfers
,
M. Horstmann
,
Marcus-Sebastian Schröder
,
K. Sohr
,
Thomas Wagner
2009
Corpus ID: 12613894
In this paper we survey the architecture and AI aspects in our project on early warningand intrusion detection based on combined…
Expand
2009
2009
On Simple Linear String Equations
Xiang Fu
,
Chung-Chih Li
,
K. Qian
2009
Corpus ID: 18403372
This paper presents a novel backward constraint solving technique for analyzing text processing programs. String constraints are…
Expand
2005
2005
Mitigating Distributed Denial-of-Service Attack with Deterministic Bit Marking
F. Merat
,
Yingtao Jiang
,
Yoohwan Kim
,
Ju-Yeon Jo
,
Mei Yang
2005
Corpus ID: 17624491
The Distributed Denial-of-Service attack is a serious threat in Internet and an effective method is needed for distinguishing the…
Expand
2004
2004
DENIAL OF SERVICE ATTACKS AND SIP INFRASTRUCTURE Attack Scenarios and Prevention Mechanisms
D. Sisalem
,
J. Kuthan
,
G. Schäfer
2004
Corpus ID: 17302015
In this paper we address the issue of denial of service (DoS) attacks targeting the hardware and software of voice over IP…
Expand
2004
2004
Cross-layer attacks in wireless ad hoc networks 1
Svetlana Radosavac
,
N. BenAmmar
,
J. Baras
2004
Corpus ID: 7730575
Denial of Service (DoS) attacks are dif- flcult to prevent and protect against. In this paper we focus on DoS attacks in wireless…
Expand
2003
2003
Combining Multiple Intrusion Detection and Response Technologies in an Active Networking Based Architecture
A. Hess
,
Michael Jung
,
G. Schäfer
DFN-Arbeitstagung über Kommunikationsnetze
2003
Corpus ID: 11777841
With the ever growing number of hosts connected to the Internet, representing potential sources of malicious attacks, and…
Expand