Sciweavers

1318 search results - page 75 / 264
» Measuring network security using dynamic bayesian network
Sort
View
WISEC
2009
ACM
15 years 9 months ago
Jamming for good: a fresh approach to authentic communication in WSNs
While properties of wireless communications are often considered as a disadvantage from a security perspective, this work demonstrates how multipath propagation, a broadcast mediu...
Ivan Martinovic, Paul Pichota, Jens B. Schmitt
BROADNETS
2007
IEEE
15 years 8 months ago
Computer worm ecology in encounter-based networks
Abstract— Encounter-based network is a frequentlydisconnected wireless ad-hoc network requiring immediate neighbors to store and forward aggregated data for information dissemina...
Sapon Tanachaiwiwat, Ahmed Helmy
ADHOC
2007
144views more  ADHOC 2007»
15 years 2 months ago
Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks
Abstract. Many ad hoc routing algorithms rely on broadcast flooding for location discovery or, more generally, for secure routing applications. Flooding is a robust algorithm but ...
Mike Burmester, Tri Van Le, Alec Yasinsac
VTC
2007
IEEE
133views Communications» more  VTC 2007»
15 years 8 months ago
An Architecture for Situation-Aware Driver Assistance Systems
Current Driver Assistance Systems merely use a minimum set of information. By using additional information of the environment hazardous situations can be detected earlier, more re...
Matthias Röckl, Patrick Robertson, Korbinian ...
MIDDLEWARE
2007
Springer
15 years 8 months ago
Dynamic multi-process information flow tracking for web application security
Although there is a large body of research on detection and prevention of such memory corruption attacks as buffer overflow, integer overflow, and format string attacks, the web...
Susanta Nanda, Lap-Chung Lam, Tzi-cker Chiueh