Sciweavers

5234 search results - page 124 / 1047
» Simulation of Computer Network Attacks
Sort
View
COMPUTER
2000
65views more  COMPUTER 2000»
13 years 9 months ago
Advances in Network Simulation
Lee Breslau, Deborah Estrin, Kevin R. Fall, Sally ...
AP2PS
2009
IEEE
14 years 19 days ago
Algorithm-Based Fault Tolerance Applied to P2P Computing Networks
—P2P computing platforms are subject to a wide range of attacks. In this paper, we propose a generalisation of the previous disk-less checkpointing approach for fault-tolerance i...
Thomas Roche, Mathieu Cunche, Jean-Louis Roch
IPPS
2007
IEEE
14 years 3 months ago
J-Sim: An Integrated Environment for Simulation and Model Checking of Network Protocols
In this paper, we report our work [24, 26] on extending the J-Sim network simulator [13] to be an integrated environment for both simulation and model checking of network protocol...
Ahmed Sobeih, Mahesh Viswanathan, Darko Marinov, J...
MUE
2008
IEEE
218views Multimedia» more  MUE 2008»
14 years 3 months ago
I-SEAD: A Secure Routing Protocol for Mobile Ad Hoc Networks
Ad hoc networks are highly dynamic routing networks cooperated by a collection of wireless mobile hosts without any assistance of centralized access point. Secure Efficient Ad hoc...
Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Ch...
FPGA
2006
ACM
156views FPGA» more  FPGA 2006»
14 years 29 days ago
A reconfigurable architecture for network intrusion detection using principal component analysis
In this paper, we develop an architecture for principal component analysis (PCA) to be used as an outlier detection method for high-speed network intrusion detection systems (NIDS...
David T. Nguyen, Gokhan Memik, Alok N. Choudhary