Sciweavers

5234 search results - page 139 / 1047
» Simulation of Computer Network Attacks
Sort
View
MASCOTS
2000
13 years 11 months ago
Stateless Routing in Network Simulations
The memory resources required by network simulations can grow quadratically with size of the simulated network. In simulations that use routing tables at each node to perform perh...
George F. Riley, Mostafa H. Ammar, Richard Fujimot...
PVM
2007
Springer
14 years 3 months ago
Multithreaded and Distributed Simulation of Large Biological Neuronal Networks
Jochen M. Eppler, Hans E. Plesser, Abigail Morriso...
VTC
2010
IEEE
415views Communications» more  VTC 2010»
13 years 8 months ago
System Level Simulation of LTE Networks
—In order to evaluate the performance of new mobile network technologies, system level simulations are crucial. They aim at determining whether, and at which level predicted link...
Josep Colom Ikuno, Martin Wrulich, Markus Rupp
CCS
2005
ACM
14 years 3 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
INFOCOM
2011
IEEE
13 years 1 months ago
The resilience of WDM networks to probabilistic geographical failures
—Telecommunications networks, and in particular optical WDM networks, are vulnerable to large-scale failures of their physical infrastructure, resulting from physical attacks (su...
Pankaj K. Agarwal, Alon Efrat, Shashidhara K. Ganj...