Sciweavers

5511 search results - page 74 / 1103
» Security for Network Places
Sort
View
IJSN
2006
124views more  IJSN 2006»
13 years 10 months ago
Wireless networking security: open issues in trust, management, interoperation and measurement
: The pervasive availability and wide usage of wireless networks with different kinds of topologies, techniques and protocol suites have brought with them a need to improve securit...
Joseph B. Evans, Weichao Wang, Benjamin J. Ewy
VIZSEC
2007
Springer
14 years 4 months ago
Visualizing Network Security Events Using Compound Glyphs from a Service-Oriented Perspective
ct Network security is the complicated field of controlling access within a computer network. One of the difficulties in network security is detecting the presence, severity, and ...
Jason Pearlman, Penny Rheingans
CMS
2006
175views Communications» more  CMS 2006»
13 years 11 months ago
Attack Graph Based Evaluation of Network Security
Abstract. The perspective directions in evaluating network security are simulating possible malefactor's actions, building the representation of these actions as attack graphs...
Igor V. Kotenko, Mikhail Stepashkin
MUE
2007
IEEE
150views Multimedia» more  MUE 2007»
14 years 4 months ago
Security Issues in Wireless Mesh Networks
Wireless Mesh Network (WMN) is a new wireless networking paradigm. Unlike traditional wireless networks, WMNs do not rely on any fixed infrastructure. Instead, hosts rely on each ...
Muhammad Shoaib Siddiqui, Choong Seon
AINA
2006
IEEE
14 years 4 months ago
Property-Based Taming of Lying Mobile Nodes
Intelligent security protocols can verify whether the involved principals have properties that are defined based on certain functional and security policies. The property we focu...
Mark Manulis, Ahmad-Reza Sadeghi