Digital Library
Search Results: [ keyword: Attack ] (108)
101.
Unified Modeling Language based Analysis of Security Attacks in Wireless Sensor Networks: A Survey
Hyeong S. Kim,
Eunjin(EJ) Jung,
Heon Y. Yeom,
Vol. 4, No. 6, December 22, 2010
10.3837/tiis.2010.12.019
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Nikita Borisov,
Marek Klonowski,
Mirosaw Kutyowski,
Anna Lauks-Dutka,
Vol. 4, No. 3, June 29, 2010
10.3837/tiis.2010.06.011
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
104.
Detection of SIP Flooding Attacks based on the Upper Bound of the Possible Number of SIP Messages
Jeong Ok Kwon,
Ik Rae Jeong,
Dong Hoon Lee,
Vol. 2, No. 6, December 24, 2008
10.3837/tiis.2008.06.003
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)