scroll to top
0

EBSCO Auth Banner

Let's find your institution. Click here.

Advanced Search Results For "Eian, Martin"

1 - 9 of 9 results for
 "Eian, Martin"
Results per page:

Examining the "Known Truths" in Cyber Threat Intelligence - The Case of STIX.

Publication Type: Conference

Source(s): Proceedings of the International Conference on Cyber Warfare & Security; 2020, p493-502, 10p, 1 Chart, 5 Graphs

Abstract: Copyright of Proceedings of the International Conference on Cyber Warfare & Security is the property of Academic Conferences International and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright hold...

A formal analysis of IEEE 802.11w deadlock vulnerabilities.

Publication Type: Conference

Source(s): 2012 Proceedings IEEE INFOCOM; 1/ 1/2012, p918-926, 9p

Abstract: Copyright of 2012 Proceedings IEEE INFOCOM is the property of IEEE and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or ...

The modeling and comparison of wireless network denial of service attacks.

Publication Type: Conference

Source(s): Proceedings of the 3rd ACM SOSP Workshop: Networking, Systems & Applications on Mobile Handhelds; Oct2011, p1-6, 6p

The modeling and comparison of wireless network denial of service attacks.

Publication Type: Conference

Source(s): ACM Symposium on Operating Systems Principles; 2011, Special section p1-6, 6p

A Practical Cryptographic Denial of Service Attack against 802.11i TKIP and CCMP.

Publication Type: Book

Source(s): Cryptology & Network Security (9783642176180); 2010, p62-75, 14p

Authors:

Abstract: Copyright of Cryptology & Network Security (9783642176180) is the property of Springer Nature / Books and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. Howe...

Fragility of the Robust Security Network: 802.11 Denial of Service.

Publication Type: Book

Source(s): Applied Cryptography & Network Security (9783642019562); 2009, p400-416, 17p

Authors:

Abstract: Copyright of Applied Cryptography & Network Security (9783642019562) is the property of Springer Nature / Books and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permis...

An Improved Attack on TKIP.

Publication Type: Book

Source(s): Identity & Privacy in the Internet Age; 2009, p120-132, 13p

Abstract: Copyright of Identity & Privacy in the Internet Age is the property of Springer Nature / Books and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, us...

The JAK Inhibitor INCB20 Induces Antiproliferative and Apoptotic Effects in Human Myeloma Cells In Vitroand In Vivo.

Publication Type: Periodical

Source(s): Blood; November 2005, Vol. 106 Issue: 11 p3357-3357, 1p

Abstract: In multiple myeloma (MM), IL-6 plays an important role for tumor cell growth, survival, and drug resistance. Janus kinases (JAKs) are protein tyrosine kinases and constitutively associated with the gp130 chain of the IL-6 receptor complex. Their activa...

Janus kinase inhibitor INCB20 has antiproliferative and apoptotic effects on human myeloma cells in vitro and in vivo.

Publication Type: Academic Journal

Source(s): Molecular cancer therapeutics [Mol Cancer Ther] 2009 Jan; Vol. 8 (1), pp. 26-35.

Abstract: Protein tyrosine kinases of the Janus kinase (JAK) family are associated with many cytokine receptors, which, on ligand binding, regulate important cellular functions such as proliferation, survival, and differentiation. In multiple myeloma, JAKs may b...

sponsored