Advanced Search Results For "Eian, Martin"
Your filters
Examining the "Known Truths" in Cyber Threat Intelligence - The Case of STIX.
Publication Type: Conference
Source(s): Proceedings of the International Conference on Cyber Warfare & Security; 2020, p493-502, 10p, 1 Chart, 5 Graphs
Abstract: Copyright of Proceedings of the International Conference on Cyber Warfare & Security is the property of Academic Conferences International and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright hold...
A formal analysis of IEEE 802.11w deadlock vulnerabilities.
Publication Type: Conference
Source(s): 2012 Proceedings IEEE INFOCOM; 1/ 1/2012, p918-926, 9p
Abstract: Copyright of 2012 Proceedings IEEE INFOCOM is the property of IEEE and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or ...
The modeling and comparison of wireless network denial of service attacks.
Publication Type: Conference
Source(s): Proceedings of the 3rd ACM SOSP Workshop: Networking, Systems & Applications on Mobile Handhelds; Oct2011, p1-6, 6p
The modeling and comparison of wireless network denial of service attacks.
Publication Type: Conference
Source(s): ACM Symposium on Operating Systems Principles; 2011, Special section p1-6, 6p
A Practical Cryptographic Denial of Service Attack against 802.11i TKIP and CCMP.
Publication Type: Book
Source(s): Cryptology & Network Security (9783642176180); 2010, p62-75, 14p
Abstract: Copyright of Cryptology & Network Security (9783642176180) is the property of Springer Nature / Books and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. Howe...
Fragility of the Robust Security Network: 802.11 Denial of Service.
Publication Type: Book
Source(s): Applied Cryptography & Network Security (9783642019562); 2009, p400-416, 17p
Abstract: Copyright of Applied Cryptography & Network Security (9783642019562) is the property of Springer Nature / Books and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permis...
An Improved Attack on TKIP.
Publication Type: Book
Source(s): Identity & Privacy in the Internet Age; 2009, p120-132, 13p
Abstract: Copyright of Identity & Privacy in the Internet Age is the property of Springer Nature / Books and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, us...
The JAK Inhibitor INCB20 Induces Antiproliferative and Apoptotic Effects in Human Myeloma Cells In Vitroand In Vivo.
Publication Type: Periodical
Source(s): Blood; November 2005, Vol. 106 Issue: 11 p3357-3357, 1p
Abstract: In multiple myeloma (MM), IL-6 plays an important role for tumor cell growth, survival, and drug resistance. Janus kinases (JAKs) are protein tyrosine kinases and constitutively associated with the gp130 chain of the IL-6 receptor complex. Their activa...
Janus kinase inhibitor INCB20 has antiproliferative and apoptotic effects on human myeloma cells in vitro and in vivo.
Publication Type: Academic Journal
Source(s): Molecular cancer therapeutics [Mol Cancer Ther] 2009 Jan; Vol. 8 (1), pp. 26-35.
Abstract: Protein tyrosine kinases of the Janus kinase (JAK) family are associated with many cytokine receptors, which, on ligand binding, regulate important cellular functions such as proliferation, survival, and differentiation. In multiple myeloma, JAKs may b...