Sciweavers

1278 search results - page 176 / 256
» Attack Graph Based Evaluation of Network Security
Sort
View
148
Voted
CCS
2007
ACM
15 years 9 months ago
The energy cost of cryptographic key establishment in wireless sensor networks
Wireless sensor nodes generally face serious limitations in terms of computational power, energy supply, and network bandwidth. Therefore, the implementation of effective and sec...
Johann Großschädl, Alexander Szekely, S...
138
Voted
ASUNAM
2009
IEEE
15 years 8 months ago
Detecting Structural Changes and Command Hierarchies in Dynamic Social Networks
Community detection in social networks varying with time is a common yet challenging problem whereby efficient visualization of evolving relationships and implicit hierarchical s...
Romain Bourqui, Frédéric Gilbert, Pa...
129
Voted
MASCOTS
2003
15 years 4 months ago
Toward Scaling Network Emulation using Topology Partitioning
Scalability is the primary challenge to studying large complex network systems with network emulation. This paper studies topology partitioning, assigning disjoint pieces of the n...
Ken Yocum, Ethan Eade, Julius Degesys, David Becke...
MOBIHOC
2005
ACM
16 years 3 months ago
Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks
Mobile sinks are needed in many sensor network applications for efficient data collection, data querying, localized sensor reprogramming, identifying and revoking compromised sens...
Wensheng Zhang, Hui Song, Sencun Zhu, Guohong Cao
193
Voted
ACSC
2004
IEEE
15 years 7 months ago
Kerberos Assisted Authentication in Mobile Ad-hoc Networks
An ad-hoc network comprises mobile nodes that cooperate with each other using wireless connections to route both data and control packets within the network. As the low transmissi...
Asad Amir Pirzada, Chris McDonald