In order to counter Denial-of-Service (DoS) attacks using spoofed source addresses, many IP traceback schemes have been proposed in the last few years...
Denial-of-Service (DoS) attacks commonly use IP spoofing to hide the identity and the location of the attack origin. To defend against various DoS att...
Worm epidemics in the last few years have shown that manual defences against worm epidemics are not practical. Recently, various automatic worm identi...
Mix networks are designed to provide anonymity for users in a variety of applications, including privacy- reservingWWWbrowsing and numerous e-commerce...
We investigate the reliability of current generation eavesdropping tools and show that obtaining ‘high fidelity’ transcripts is harder than previously...