Sciweavers

5234 search results - page 119 / 1047
» Simulation of Computer Network Attacks
Sort
View
EUC
2005
Springer
15 years 7 months ago
Collision Attack on XTR and a Countermeasure with a Fixed Pattern
Public-key cryptosystem (PKC) is one of inevitable key technologies in order to accomplish fruitful security applications in ubiquitous computing systems. The ubiquitous computer o...
Dong-Guk Han, Tsuyoshi Takagi, Tae-Hyun Kim, Howon...
GECCO
2009
Springer
152views Optimization» more  GECCO 2009»
15 years 8 months ago
Application of evolutionary algorithms in detection of SIP based flooding attacks
The Session Initiation Protocol (SIP) is the de facto standard for user’s session control in the next generation Voice over Internet Protocol (VoIP) networks based on the IP Mul...
M. Ali Akbar, Muddassar Farooq
151
Voted
ADHOC
2011
14 years 9 months ago
NetTopo: A framework of simulation and visualization for wireless sensor networks
Lei Shu, Manfred Hauswirth, Han-Chieh Chao, Min Ch...
LCN
2006
IEEE
15 years 8 months ago
Accuracy-Speedup Tradeoffs for a Time-Parallel Simulation of Wireless Ad hoc Networks
We introduce a scalable algorithm for time-parallel simulations of wireless ad hoc networks and report on our results. Our approach decomposes the simulation into overlapping temp...
Guoqiang Wang, Damla Turgut, Ladislau Böl&oum...