Sciweavers

97 search results - page 15 / 20
» IP covert timing channels: design and detection
Sort
View
WWW
2005
ACM
14 years 8 months ago
On business activity modeling using grammars
Web based applications offer a mainstream channel for businesses to manage their activities. We model such business activity in a grammar-based framework. The Backus Naur form not...
Savitha Srinivasan, Arnon Amir, Prasad Deshpande, ...
PIMRC
2008
IEEE
14 years 1 months ago
Double Hopping: A new approach for Dynamic Frequency Hopping in Cognitive Radio networks
—One of the major challenges in designing cellular Cognitive Radio (CR) networks is the avoidance of Secondary User (SU) interference to so called Primary Users (PUs) operating i...
Daniel Willkomm, Mathias Bohge, Daniel Hollos, Jam...
ICC
2007
IEEE
151views Communications» more  ICC 2007»
14 years 1 months ago
Sensing-Throughput Tradeoff for Cognitive Radio Networks
— In cognitive radio networks, the secondary network (users) are allowed to utilize the frequency bands of primary network (users) when they are not currently being used. To supp...
Ying-Chang Liang, Yonghong Zeng, Edward Chu Yeow P...
SUTC
2006
IEEE
14 years 1 months ago
Detection and Repair of Software Errors in Hierarchical Sensor Networks
Abstract— Sensor networks are being increasingly deployed for collecting critical data in various applications. Once deployed, a sensor network may experience faults at the indiv...
Douglas Herbert, Yung-Hsiang Lu, Saurabh Bagchi, Z...
CN
2007
137views more  CN 2007»
13 years 7 months ago
Defending against hitlist worms using network address space randomization
Worms are self-replicating malicious programs that represent a major security threat for the Internet, as they can infect and damage a large number of vulnerable hosts at timescal...
Spyros Antonatos, Periklis Akritidis, Evangelos P....