Network Denial of Service (DoS) attacks are increasing in frequency, severity and sophistication, making it desirable to measure the resilience of systems to DoS attacks. In this p...
Yan Chen, Adam W. Bargteil, David Bindel, Randy H....
Due to their large worldwide adoption, Social Network Sites (SNSs) have been widely used in many global events as an important source to spread news and information. While the sear...
Fabio Celli, F. Marta L. Di Lascio, Matteo Magnani...
Wireless networks are being integrated into the modern automobile. The security and privacy implications of such in-car networks, however, are not well understood as their transmi...
Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis T...
Abstract—We consider the location service in a mobile adhoc network (MANET), where each node needs to maintain its location information in the network by (i) frequently updating ...
— In this paper, we extend the optimal worst-case QoS routing algorithm and metric definition given in [1]. We prove that in addition to the q-ary symmetric and q-ary erasure ch...