Relative to the impressive number of proposals addressing the multitude of challenges raised by IEEE 802.11-based wireless networks, few have known real implementation. In wireless...
Fehmi Ben Abdesslem, Luigi Iannone, Marcelo Dias d...
An increasing variety of malware, such as worms, spyware and adware, threatens both personal and business computing. Remotely controlled bot networks of compromised systems are gr...
: In this paper, we propose an autonomic management framework (ASGrid) to address the requirements of emerging large-scale applications in hybrid grid and sensor network systems. T...
Mobile phones have two sensors: a camera and a microphone. The widespread and ubiquitous nature of mobile phones around the world makes it attractive to build a large-scale sensor...
The problem of security against timing based traffic analysis in multihop networks is considered in this work. In particular, the relationship between the level of anonymity prov...