Sciweavers

21 search results - page 2 / 5
» Modelling of Pseudonymity under Probabilistic Linkability At...
Sort
View
CDC
2010
IEEE
272views Control Systems» more  CDC 2010»
13 years 2 months ago
Node capture attacks in wireless sensor networks: A system theoretic approach
In this paper we address the problem of physical node capture attacks in wireless sensor networks and provide a control theoretic framework to model physical node capture, cloned n...
Tamara Bonaci, Linda Bushnell, Radha Poovendran
INFOCOM
2011
IEEE
12 years 11 months ago
The resilience of WDM networks to probabilistic geographical failures
—Telecommunications networks, and in particular optical WDM networks, are vulnerable to large-scale failures of their physical infrastructure, resulting from physical attacks (su...
Pankaj K. Agarwal, Alon Efrat, Shashidhara K. Ganj...
WSC
2008
13 years 10 months ago
Integrated human decision making model under Belief-Desire-Intention framework for crowd simulation
An integrated Belief-Desire-Intention (BDI) modeling framework is proposed for human decision making and planning, whose sub-modules are based on Bayesian belief network (BBN), De...
Seungho Lee, Young-Jun Son
ADHOC
2007
115views more  ADHOC 2007»
13 years 7 months ago
Modeling adaptive node capture attacks in multi-hop wireless networks
We investigate the problem of modeling node capture attacks in heterogeneous wireless ad hoc and mesh networks. Classical adversarial models such as the Dolev–Yao model are know...
Patrick Tague, Radha Poovendran
IEEEARES
2006
IEEE
14 years 1 months ago
Towards a Stochastic Model for Integrated Security and Dependability Evaluation
We present a new approach to integrated security and dependability evaluation, which is based on stochastic modelling techniques. Our proposal aims to provide operational measures...
Karin Sallhammar, Bjarne E. Helvik, Svein J. Knaps...