Sciweavers

1318 search results - page 67 / 264
» Measuring network security using dynamic bayesian network
Sort
View
151
Voted
ISCAPDCS
2003
15 years 3 months ago
Performance of a Jini-based Ad Hoc Network Authentication Scheme
Ad hoc networks provide a dynamically reconfigurable network infrastructure where entities can participate at will. Jini technology can be used to implement an ad hoc network, and...
M. M. McMahon, D. M. Needham, J. B. Datko
WORM
2003
15 years 3 months ago
Worm anatomy and model
We present a general framework for reasoning about network worms and analyzing the potency of worms within a specific network. First, we present a discussion of the life cycle of ...
Dan Ellis
CORR
2011
Springer
536views Education» more  CORR 2011»
14 years 9 months ago
Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator
— Mobile ad hoc networks (MANETs) are dynamic wireless networks without any infrastructure. These networks are weak against many types of attacks. One of these attacks is the bla...
H. A. Esmaili, M. R. Khalili Shoja, Hossein Gharae...
FAABS
2004
Springer
15 years 7 months ago
Agent-Based Chemical Plume Tracing Using Fluid Dynamics
Abstract. This paper presents a rigorous evaluation of a novel, distributed chemical plume tracing algorithm. The algorithm is a combination of the best aspects of the two most pop...
Dimitri Zarzhitsky, Diana F. Spears, David R. Thay...
COMSWARE
2008
IEEE
15 years 9 months ago
Deterministic schemes for key distribution in wireless sensor networks
— In this paper, we propose a new security metric for measuring resilience of a symmetric key distribution scheme in wireless sensor network. A polynomial-based and a novel compl...
Abhishek Gupta, Joy Kuri