Skip to search formSkip to main contentSkip to account menu

Countermeasure (computer)

In computer security a countermeasure is an action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
We address the problem of preventing the inference of contextual information in event-driven wireless sensor networks (WSNs). The… 
2009
2009
This letter shows a potentially harmful scenario named Induced-shrew attack in which a malicious TCP receiver remotely controls… 
Review
2007
Review
2007
In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with VoIP… 
Highly Cited
2005
Highly Cited
2005
Most of the multicast routing protocols proposed for ad hoc networks assume a trusted, non-adversarial environment and do not… 
Highly Cited
2005
Highly Cited
2005
Fault injection based attacks on cryptographic devices aim at recovering the secret keys by inducing an error in the computation… 
2005
2005
Traceback schemes are useful to identify the source of an attack. Existing traceback systems are not suitable for Mobile Ad Hoc… 
Highly Cited
2003
Highly Cited
2003
Next generation systems will support mobility based on the continuing advancements in wireless technology. An integrated solution… 
1994
1994
This report provides a preliminary analysis of intersection-related, left turn across path (LTAP) crashes and applicable… 
1993
1993
This paper describes a model for (1) studying the genesis of rear-end collisions in freeway traffic and (2) estimating the…