Sciweavers

7741 search results - page 85 / 1549
» Security in Active Networks
Sort
View
IWAN
2000
Springer
14 years 1 months ago
Differentiated Quality of Service in Application Layer Active Networks
A novel approach to quality of service control in an active service network (application layer active network) is described. The approach makes use of a distributed genetic algori...
Chris M. Roadknight, Ian W. Marshall
FGCN
2007
IEEE
173views Communications» more  FGCN 2007»
14 years 8 hour ago
Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation
A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. A black hole is a malicious node that falsely replies for any route r...
Hesiri Weerasinghe, Huirong Fu
MOBIHOC
2001
ACM
14 years 9 months ago
Secure pebblenets
Stefano Basagni, Kris Herrin, Danilo Bruschi, Emil...
EWSN
2007
Springer
14 years 9 months ago
Secure Data Aggregation with Multiple Encryption
Melek Önen, Refik Molva
VIZSEC
2005
Springer
14 years 3 months ago
IDS RainStorm: Visualizing IDS Alarms
The massive amount of alarm data generated from intrusion detection systems is cumbersome for network system administrators to analyze. Often, important details are overlooked and...
Kulsoom Abdullah, Christopher P. Lee, Gregory J. C...