Sciweavers

215 search results - page 17 / 43
» A Mobile Ambients-Based Approach for Network Attack Modellin...
Sort
View
MOBISYS
2006
ACM
14 years 7 months ago
Building realistic mobility models from coarse-grained traces
In this paper we present a trace-driven framework capable of building realistic mobility models for the simulation studies of mobile systems. With the goal of realism, this framew...
Jungkeun Yoon, Brian D. Noble, Mingyan Liu, Minkyo...
JSAC
2007
224views more  JSAC 2007»
13 years 7 months ago
AMOEBA: Robust Location Privacy Scheme for VANET
Abstract— Communication messages in vehicular ad hoc networks (VANET) can be used to locate and track vehicles. While tracking can be beneficial for vehicle navigation, it can a...
Krishna Sampigethaya, Mingyan Li, Leping Huang, Ra...
ICDCSW
2008
IEEE
14 years 2 months ago
A Novel CDS-Based Reputation Monitoring System for Wireless Sensor Networks
Reputation and Trust-based Monitoring Systems (RTMSs) have provided a ubiquitous framework for secure Wireless Sensor Network (WSN) computing. Employing sensors for neighborhood m...
Avinash Srinivasan, Feng Li, Jie Wu
ICNP
2007
IEEE
14 years 2 months ago
A Poisoning-Resilient TCP Stack
— We treat the problem of large-scale TCP poisoning: an attacker, who is able to monitor TCP packet headers in the network, can deny service to all flows traversing the monitori...
Amit Mondal, Aleksandar Kuzmanovic
CORR
2007
Springer
138views Education» more  CORR 2007»
13 years 7 months ago
On the Performance Evaluation of Encounter-based Worm Interactions Based on Node Characteristics
An encounter-based network is a frequently-disconnected wireless ad-hoc network requiring nearby neighbors to store and forward data utilizing mobility and encounters over time. U...
Sapon Tanachaiwiwat, Ahmed Helmy