Sciweavers

422 search results - page 76 / 85
» Identity-based attack detection in mobile wireless networks
Sort
View
IAW
2003
IEEE
14 years 28 days ago
An Evolutionary Approach to Generate Fuzzy Anomaly Signatures
Abstract— This paper describes the generation of fuzzy signatures to detect some cyber attacks. This approach is an enhancement to our previous work, which was based on the princ...
Fabio A. González, Jonatan Gómez, Ma...
ADHOCNOW
2008
Springer
14 years 2 months ago
Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking
Ad hoc networks are exposed more than traditional networks to security threats due to their mobility and open architecture aspects. In addition, any dysfunction due to badly congu...
Wissam Mallouli, Bachar Wehbi, Ana R. Cavalli
INFOCOM
2007
IEEE
14 years 1 months ago
Many-to-Many Communication: A New Approach for Collaboration in MANETs
—We introduce a collaboration-driven approach to the sharing of the available bandwidth in wireless ad hoc networks, which we call many-to-many cooperation, that allows concurren...
Renato M. de Moraes, Hamid R. Sadjadpour, J. J. Ga...
MOBISYS
2007
ACM
14 years 7 months ago
MobiUS: enable together-viewing video experience across two mobile devices
We envision a new better-together mobile application paradigm where multiple mobile devices are placed in a close proximity and study a specific together-viewing video application...
Guobin Shen, Yanlin Li, Yongguang Zhang
COMPSEC
2006
97views more  COMPSEC 2006»
13 years 7 months ago
Towards a location-based mandatory access control model
With the growing use of wireless networks and mobile devices, we are moving towards an era where location information will be necessary for access control. The use of location inf...
Indrakshi Ray, Mahendra Kumar