Sciweavers

832 search results - page 15 / 167
» Effect of Malicious Synchronization
Sort
View
IEEECIT
2010
IEEE
13 years 8 months ago
Interpretation of AADL Behavior Annex into Synchronous Formalism Using SSA
This article focuses on the essence and distinctive features of the AADL behavioral aspects, for which we use the code generation infrastructure of the synchronous modeling enviro...
Yue Ma, Jean-Pierre Talpin, Thierry Gautier
WCNC
2008
IEEE
14 years 4 months ago
Testbed Implementation of a Secure Flooding Time Synchronization Protocol
Abstract— A fundamental building block in distributed wireless sensor networks is time synchronization. Given resource constrained nature of sensor networks, traditional time syn...
Tanya Roosta, Wei-Chieh Liao, Wei-Chung Teng, Shan...
DEXAW
2002
IEEE
97views Database» more  DEXAW 2002»
14 years 2 months ago
Several Structures for Protecting the Routes of Mobile Agents Dispatched in Parallel
For mobile agents to be effective in practice, they have to be securely and efficiently deployed. In this paper, we propose and discuss several route structures and methods for mo...
Yan Wang 0002, Kian-Lee Tan, Xiaolin Pang
ICC
2007
IEEE
14 years 4 months ago
On the Risk-Based Operation of Mobile Attacks in Wireless Ad Hoc Networks
—In this paper we study the propagation of malicious software in wireless ad hoc networks under a probabilistic framework. We design topology control algorithms for the developme...
Vasileios Karyotis, Symeon Papavassiliou, Mary Gra...
WWW
2005
ACM
14 years 10 months ago
TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks
Reputation systems have been popular in estimating the trustworthiness and predicting the future behavior of nodes in a large-scale distributed system where nodes may transact wit...
Mudhakar Srivatsa, Li Xiong, Ling Liu