Sciweavers

1875 search results - page 312 / 375
» Automatic Network Protocol Analysis
Sort
View
PDCAT
2009
Springer
14 years 3 months ago
Analytical Study of Adversarial Strategies in Cluster-based Overlays
Abstract—Awerbuch and Scheideler have shown that peerto-peer overlays networks can survive Byzantine attacks only if malicious nodes are not able to predict what will be the topo...
Emmanuelle Anceaume, Francisco V. Brasileiro, Roma...
SECON
2007
IEEE
14 years 3 months ago
Privacy Preserving Communication in MANETs
Abstract— Mobile ad hoc networks often support sensitive applications. These applications may require that users’ identity, location, and correspondents be kept secret. This is...
Heesook Choi, Patrick Drew McDaniel, Thomas F. La ...
IMC
2003
ACM
14 years 2 months ago
On the correlation between route dynamics and routing loops
Routing loops are caused by inconsistencies in the routing state of the network. Although undesirable from this aspect, they can provide insight into the routing dynamics that cau...
Ashwin Sridharan, Sue B. Moon, Christophe Diot
USS
2008
13 years 11 months ago
To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads
We present an automated, scalable, method for crafting dynamic responses to real-time network requests. Specifically, we provide a flexible technique based on natural language pro...
Sam Small, Joshua Mason, Fabian Monrose, Niels Pro...
GLOBECOM
2008
IEEE
13 years 10 months ago
Outage Behavior of Cooperative Diversity with Relay Selection
Abstract—Cooperative diversity is a useful technique to increase reliability and throughput of wireless networks. To analyze the performance gain from cooperative diversity, outa...
Kampol Woradit, Tony Q. S. Quek, Watcharapan Suwan...