Sciweavers

832 search results - page 88 / 167
» Effect of Malicious Synchronization
Sort
View
INFOCOM
2005
IEEE
14 years 3 months ago
Anonymous communications in mobile ad hoc networks
— Due to the broadcast nature of radio transmissions, communications in mobile ad hoc networks (MANETs) are more susceptible to malicious traffic analysis. In this paper we prop...
Yanchao Zhang, Wei Liu, Wenjing Lou
ATAL
2005
Springer
14 years 3 months ago
Agent-based virtual organisations for the Grid
The ability to create reliable and scalable virtual organisations (VOs) on demand in a dynamic, open and competitive environment is one of the major challenges that underlie Grid ...
Jigar Patel, W. T. Luke Teacy, Nicholas R. Jenning...
DISCEX
2003
IEEE
14 years 3 months ago
Detecting Spoofed Packets
Packets sent using the IP protocol include the IP address of the sending host. The recipient directs replies to the sender using this source address. However, the correctness of t...
Steven J. Templeton, Karl E. Levitt
GI
2003
Springer
14 years 3 months ago
Byzantine Failures and Security: Arbitrary is not (always) Random
: The Byzantine failure model allows arbitrary behavior of a certain fraction of network nodes in a distributed system. It was introduced to model and analyze the effects of very s...
Felix C. Gärtner
ASUNAM
2009
IEEE
14 years 3 months ago
Filtering Spam in Social Tagging System with Dynamic Behavior Analysis
—Spam in social tagging systems introduced by some malicious participants has become a serious problem for its global popularizing. Some studies which can be deduced to static us...
Bo Liu, Ennan Zhai, Huiping Sun, Yelu Chen, Zhong ...