Sciweavers

2691 search results - page 391 / 539
» Security in Ad Hoc Networks
Sort
View
RAID
2009
Springer
14 years 4 months ago
Protecting a Moving Target: Addressing Web Application Concept Drift
Because of the ad hoc nature of web applications, intrusion detection systems that leverage machine learning techniques are particularly well-suited for protecting websites. The re...
Federico Maggi, William K. Robertson, Christopher ...
AAAIDEA
2005
IEEE
14 years 3 months ago
SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System
Voice over IP (VoIP) and Instant Messaging (IM) systems to date have either followed a client-server model or have required the use of clients that do not follow any VoIP or IM st...
David A. Bryan, Bruce Lowekamp, Cullen Jennings
IJNSEC
2011
77views more  IJNSEC 2011»
13 years 5 months ago
Performance Evaluation of the TSS Node Authentication Scheme in Noisy MANETs
This paper presents a description and performance evaluation of a threshold secret sharing (TSS) node authentication scheme in noisy mobile ad hoc networks (MANETs). The scheme ca...
Hussein Al-Bahadili, Shakir Hussain, Ghassan Issa,...
INFOSCALE
2006
ACM
14 years 4 months ago
A predictive approach to achieving consistency in cooperative caching in MANET
Cooperative caching is a very important technique for efficient data dissemination and sharing in mobile ad hoc networks (MANETs). Many applications have requirements on the consi...
Yu Huang 0002, Jiannong Cao, Beihong Jin
SIGMETRICS
2005
ACM
104views Hardware» more  SIGMETRICS 2005»
14 years 3 months ago
Message delay in MANET
A generic stochastic model with only two input parameters is introduced to evaluate the message delay in mobile ad hoc networks (MANETs) where nodes may relay messages. The Laplac...
Robin Groenevelt, Philippe Nain, Ger Koole