Sciweavers

5234 search results - page 131 / 1047
» Simulation of Computer Network Attacks
Sort
View
PERCOM
2007
ACM
14 years 9 months ago
Distributed, Uncertainty-Aware Access Control for Pervasive Computing
Access control to sensitive resources in pervasive computing needs to take uncertainty into account. Previous research has developed uncertainty-aware access-control models for en...
Urs Hengartner, Ge Zhong
GLOBECOM
2010
IEEE
13 years 7 months ago
Identifying Insider-Based Jammers in Multi-Channel Wireless Networks
Abstract-- We consider the problem of identifying insiderbased attacks in the form of jammers in multi-channel wireless networks, where jammers have the inside knowledge of frequen...
Hoang Nguyen, Thadpong Pongthawornkamol, Klara Nah...
ICCD
2008
IEEE
142views Hardware» more  ICCD 2008»
14 years 6 months ago
Making register file resistant to power analysis attacks
— Power analysis attacks are a type of side-channel attacks that exploits the power consumption of computing devices to retrieve secret information. They are very effective in br...
Shuo Wang, Fan Zhang, Jianwei Dai, Lei Wang, Zhiji...
CF
2010
ACM
14 years 2 months ago
Scalable simulation of complex network routing policies
Andrew Ian Stone, Steve DiBenedetto, Michelle Mill...
WIMOB
2008
IEEE
14 years 3 months ago
Enhancing the Credibility of Wireless Network Simulations with Experiment Automation
L. Felipe Perrone, Christopher J. Kenna, Bryan C. ...