Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 229,564,795 papers from all fields of science
Search
Sign In
Create Free Account
Countermeasure (computer)
In computer security a countermeasure is an action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
28 relations
Application security
Asset (computer security)
Attack (computing)
Common Vulnerabilities and Exposures
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNs
Alejandro Proaño
,
Loukas Lazos
,
M. Krunz
IEEE Transactions on Mobile Computing
2017
Corpus ID: 13943835
We address the problem of preventing the inference of contextual information in event-driven wireless sensor networks (WSNs). The…
Expand
2009
2009
On remote exploitation of TCP sender for low-rate flooding denial-of-service attack
V. A. Kumar
,
P. S. Jayalekshmy
,
G. Patra
,
R. P. Thangavelu
IEEE Communications Letters
2009
Corpus ID: 20460383
This letter shows a potentially harmful scenario named Induced-shrew attack in which a malicious TCP receiver remotely controls…
Expand
Review
2007
Review
2007
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
P. Thermos
,
A. Takanen
2007
Corpus ID: 166953466
In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with VoIP…
Expand
Highly Cited
2005
Highly Cited
2005
Securing MAODV: attacks and countermeasures
Sankardas Roy
,
Venkata Gopala Krishna Addada
,
Sanjeev Setia
,
S. Jajodia
Second Annual IEEE Communications Society…
2005
Corpus ID: 7839665
Most of the multicast routing protocols proposed for ad hoc networks assume a trusted, non-adversarial environment and do not…
Expand
Highly Cited
2005
Highly Cited
2005
Incorporating error detection and online reconfiguration into a regular architecture for the advanced encryption standard
L. Breveglieri
,
I. Koren
,
P. Maistri
IEEE International Symposium on Defect and Fault…
2005
Corpus ID: 29411961
Fault injection based attacks on cryptographic devices aim at recovering the secret keys by inducing an error in the computation…
Expand
2005
2005
Hotspot-based traceback for mobile ad hoc networks
Yi-an Huang
,
Wenke Lee
WISE
2005
Corpus ID: 7366098
Traceback schemes are useful to identify the source of an attack. Existing traceback systems are not suitable for Mobile Ad Hoc…
Expand
Highly Cited
2003
Highly Cited
2003
Multilayer mobility management for all-IP networks: pure SIP vs. hybrid SIP/mobile IP
C. Politis
,
K. Chew
,
R. Tafazolli
The 57th IEEE Semiannual Vehicular Technology…
2003
Corpus ID: 16363893
Next generation systems will support mobility based on the continuing advancements in wireless technology. An integrated solution…
Expand
Highly Cited
2003
Highly Cited
2003
Balanced self-checking asynchronous logic for smart card applications
S. Moore
,
Ross J. Anderson
,
R. Mullins
,
G. Taylor
,
J. Fournier
Microprocessors and microsystems
2003
Corpus ID: 2186513
1994
1994
EXAMINATION OF INTERSECTION, LEFT TURN ACROSS PATH CRASHES AND POTENTIAL IVHS COUNTERMEASURES. FINAL REPORT
J. Chovan
,
L. Tijerina
,
J. Everson
,
J. Pierowicz
,
L. Donald
,
Hendricks Calspan
1994
Corpus ID: 106843673
This report provides a preliminary analysis of intersection-related, left turn across path (LTAP) crashes and applicable…
Expand
1993
1993
USING FREEWAY TRAFFIC DATA TO ESTIMATE THE EFFECTIVENESS OF REAR-END COLLISION COUNTERMEASURES
E. Farber
,
M. Paley
1993
Corpus ID: 106883840
This paper describes a model for (1) studying the genesis of rear-end collisions in freeway traffic and (2) estimating the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE