Sciweavers

270 search results - page 31 / 54
» On the Impact of Security on the Performance of WLANs
Sort
View
INFOCOM
2007
IEEE
14 years 2 months ago
Modeling Time-Variant User Mobility in Wireless Mobile Networks
Abstract— Realistic mobility models are important to understand the performance of routing protocols in wireless ad hoc networks, especially when mobility-assisted routing scheme...
Wei-jen Hsu, Thrasyvoulos Spyropoulos, Konstantino...
CN
2008
176views more  CN 2008»
13 years 8 months ago
ARQ-based cross-layer optimization for wireless multicarrier transmission on cognitive radio networks
The primary feature of cognitive radios for wireless communication systems is the capability to optimize the relevant communication parameters given a dynamic wireless channel env...
Alexandre de Baynast, Petri Mähönen, Mar...
CCS
2007
ACM
14 years 2 months ago
Topological analysis of network attack vulnerability
: To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level...
Sushil Jajodia
IEEEARES
2006
IEEE
14 years 1 months ago
Replication Strategies for Reliable Decentralised Storage
Distributed hash tables (DHTs) can be used as the basis of a resilient lookup service in unstable environments: local routing tables are updated to reflected changes in the netwo...
Matthew Leslie, Jim Davies, Todd Huffman
ACSAC
2010
IEEE
13 years 5 months ago
Two methodologies for physical penetration testing using social engineering
Penetration tests on IT systems are sometimes coupled with physical penetration tests and social engineering. In physical penetration tests where social engineering is allowed, th...
Trajce Dimkov, Wolter Pieters, Pieter H. Hartel