Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to its limited network/host resources. Attacker traceback is a promi...
While it provides the unprecedented processing power to solve many large scale computational problems, GRID, if abused, has the potential to easily be used to launch (for instance...
Automated rule induction procedures like machine learning and statistical techniques result in rules that lack generalization and maintainability. Developing rules manually throug...
—We propose a secure routing architecture for Mobile Ad hoc NETworks (MANETs) called ThroughpUt-Feedback (TUF) routing, which is resilient against a wide range of routing disrupt...
Ruiliang Chen, Michael Snow, Jung Min Park, M. Tam...
Node capture is considered as one of the most critical issues in the security of wireless sensor networks. A popular approach to thwart the problem relies on the detection of event...