Because of the ad hoc nature of web applications, intrusion detection systems that leverage machine learning techniques are particularly well-suited for protecting websites. The re...
Federico Maggi, William K. Robertson, Christopher ...
: In this paper, we discuss a novel reservation-based, asynchronous MAC protocol called `Multi-rate Multi-hop MAC Protocol' (MMMP) for multi-hop ad hoc networks that provides ...
Wireless ad-hoc networks consist of mobile nodes forming a dynamically changing topology without any infrastructure. Multicasting in a wireless ad-hoc network is difficult and chal...
George D. Kondylis, Srikanth V. Krishnamurthy, Son...
Abstract—In this paper we consider wireless cooperative multihop networks, where nodes that have decoded the message at the previous hop cooperate in the transmission toward the ...
Intrusion detection systems (IDS) perform an important role in the provision of network security, providing real- time notification of attacks in progress. One promising category ...