Sciweavers

1278 search results - page 125 / 256
» Attack Graph Based Evaluation of Network Security
Sort
View
TSP
2011
197views more  TSP 2011»
14 years 10 months ago
Group Object Structure and State Estimation With Evolving Networks and Monte Carlo Methods
—This paper proposes a technique for motion estimation of groups of targets based on evolving graph networks. The main novelty over alternative group tracking techniques stems fr...
Amadou Gning, Lyudmila Mihaylova, Simon Maskell, S...
ICICS
2004
Springer
15 years 9 months ago
Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV)
A mobile ad hoc network (MANET) is formed by a group of mobile wireless nodes, each of which functions as a router and agrees to forward packets for others. Many routing protocols ...
Tao Wan, Evangelos Kranakis, Paul C. van Oorschot
CCS
2006
ACM
15 years 7 months ago
Secure hierarchical in-network aggregation in sensor networks
In-network aggregation is an essential primitive for performing queries on sensor network data. However, most aggregation algorithms assume that all intermediate nodes are trusted...
Haowen Chan, Adrian Perrig, Dawn Xiaodong Song
TEC
2002
166views more  TEC 2002»
15 years 3 months ago
An artificial immune system architecture for computer security applications
With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect ...
Paul K. Harmer, Paul D. Williams, Gregg H. Gunsch,...
IJNSEC
2006
134views more  IJNSEC 2006»
15 years 3 months ago
Physical Security Perimeters for Wireless Local Area Networks
On a wired network, physical authentication is implicitly provided by access: if a user is able to plug a cable into a network socket, he must have cleared other security checks s...
Vishal Bhargava, Mihail L. Sichitiu