Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,639,207 papers from all fields of science
Search
Sign In
Create Free Account
Attack patterns
In computer science, attack patterns are a group of rigorous methods for finding bugs or errors in code related to computer security. Attack patterns…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
21 relations
Authentication
Buffer overflow
Class diagram
Common Vulnerabilities and Exposures
Expand
Broader (1)
Software testing
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Integrated System for Malicious Node Discovery and Self-destruction in Wireless Sensor Networks
M. Plastoi
,
O. Banias
,
D. Curiac
,
C. Voloşencu
,
Roxana Tudoroiu
,
A. Doboli
arXiv.org
2018
Corpus ID: 51921140
With the tremendous advances of the wireless devices technology, securing wireless sensor networks became more and more a vital…
Expand
2017
2017
A System for Detecting Targeted Cyber-Attacks Using Attack Patterns
I. Herwono
,
F. El-Moussa
International Conference on Information Systems…
2017
Corpus ID: 52082170
Detecting multi-stage cyber-attacks remains a challenge for any security analyst working in large corporate environments…
Expand
2012
2012
Automating Threat Modeling through the Software Development Life-Cycle
Guifré Ruiz
,
E. Heymann
,
Eduardo C´esar
,
B. Miller
2012
Corpus ID: 14252675
— Fixing software security issues early in the development life-cycle reduces its cost dramatically. Companies doing software…
Expand
Review
2009
Review
2009
Early Warning and Intrusion Detection based on Combined AI Methods
S. Edelkamp
,
Carsten Elfers
,
M. Horstmann
,
Marcus-Sebastian Schröder
,
K. Sohr
,
Thomas Wagner
2009
Corpus ID: 12613894
In this paper we survey the architecture and AI aspects in our project on early warningand intrusion detection based on combined…
Expand
2008
2008
Fast Detection of Distributed Global Scale Network Attack Symptoms and Patterns in High-speed Backbone Networks
Sun Ho Kim
,
B. Roh
KSII Transactions on Internet and Information…
2008
Corpus ID: 1653169
Traditional attack detection schemes based on packets or flows have very high computational complexity. And, network based…
Expand
2007
2007
SecureRank: A Risk-Based Vulnerability Management Scheme for Computing Infrastructures
Reiko Ann Miura-Ko
,
N. Bambos
IEEE International Conference on Communications
2007
Corpus ID: 23548348
In this paper, we introduce a new scheme called SecureRank for prioritizing vulnerabilities to patch in computing systems…
Expand
2007
2007
Patterns for VoIP Signaling Protocol Architectures
Juan C. Pelaez
,
E. Fernández
European Conference on Pattern Languages of…
2007
Corpus ID: 29839302
Voice over IP (VoIP) is an alternative to traditional circuit-switched telephony that allows human voice and video to travel over…
Expand
2005
2005
Mitigating Distributed Denial-of-Service Attack with Deterministic Bit Marking
F. Merat
,
Yingtao Jiang
,
Yoohwan Kim
,
Ju-Yeon Jo
,
Mei Yang
2005
Corpus ID: 17624491
The Distributed Denial-of-Service attack is a serious threat in Internet and an effective method is needed for distinguishing the…
Expand
2004
2004
DENIAL OF SERVICE ATTACKS AND SIP INFRASTRUCTURE Attack Scenarios and Prevention Mechanisms
D. Sisalem
,
J. Kuthan
,
G. Schäfer
2004
Corpus ID: 17302015
In this paper we address the issue of denial of service (DoS) attacks targeting the hardware and software of voice over IP…
Expand
2004
2004
Cross-layer attacks in wireless ad hoc networks 1
Svetlana Radosavac
,
N. BenAmmar
,
J. Baras
2004
Corpus ID: 7730575
Denial of Service (DoS) attacks are dif- flcult to prevent and protect against. In this paper we focus on DoS attacks in wireless…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE