Sciweavers

1318 search results - page 147 / 264
» Measuring network security using dynamic bayesian network
Sort
View
SPW
1999
Springer
14 years 1 months ago
Performance of Protocols
This paper presents a comprehensive study on the performance of common MANET (mobile ad hoc network) routing protocols under realistic network scenarios. The routing protocols use...
Michael Roe
ICWN
2003
13 years 10 months ago
Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks
Mobile ad hoc networks (MANETs) are extensively used in military and civilian applications. The dynamic topology of MANETs allows nodes to join and leave the network at any point ...
Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantarad...
ALMOB
2007
111views more  ALMOB 2007»
13 years 9 months ago
Transcriptional regulatory network discovery via multiple method integration: application to e. coli K12
Motivation: Transcriptional regulatory network (TRN) discovery from one method (e.g. microarray analysis, gene ontology, phylogenic similarity) does not seem feasible due to lack ...
Jingjun Sun, Kagan Tuncay, Alaa Abi Haidar, Lisa E...
ISITA
2010
13 years 7 months ago
Directed information and the NRL Network Pump
The NRL Network Pump R , or Pump, is a standard for mitigating covert channels that arise in a multi-level secure (MLS) system when a high user (HU) sends acknowledgements to a low...
Siva K. Gorantla, Sachin Kadloor, Todd P. Coleman,...
WINET
2010
127views more  WINET 2010»
13 years 7 months ago
A Markov Decision Process based flow assignment framework for heterogeneous network access
We consider a scenario where devices with multiple networking capabilities access networks with heterogeneous characteristics. In such a setting, we address the problem of effici...
Jatinder Pal Singh, Tansu Alpcan, Piyush Agrawal, ...