Sciweavers

5234 search results - page 141 / 1047
» Simulation of Computer Network Attacks
Sort
View
SASN
2004
ACM
14 years 3 months ago
Securing quality-of-service route discovery in on-demand routing for ad hoc networks
An ad hoc network is a collection of computers (nodes) that cooperate to forward packets for each other over a multihop wireless network. Users of such networks may wish to use de...
Yih-Chun Hu, David B. Johnson
ACSAC
2010
IEEE
13 years 7 months ago
Cujo: efficient detection and prevention of drive-by-download attacks
The JavaScript language is a core component of active and dynamic web content in the Internet today. Besides its great success in enhancing web applications, however, JavaScript p...
Konrad Rieck, Tammo Krueger, Andreas Dewald
TRIDENTCOM
2005
IEEE
14 years 3 months ago
Integrated Network Experimentation using Simulation and Emulation
Discrete-event packet-level network simulation is well-known and widely used. Network emulation is a hybrid approach that combines real elements of a deployed networked applicatio...
Shashi Guruprasad, Robert Ricci, Jay Lepreau
IPPS
2007
IEEE
14 years 3 months ago
On the Security of Ultrasound as Out-of-band Channel
Ultrasound has been proposed as out-of-band channel for authentication of peer devices in wireless ad hoc networks. Ultrasound can implicitly contribute to secure communication ba...
Rene Mayrhofer, Hans Gellersen
MOBIHOC
2005
ACM
14 years 9 months ago
Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks
Mobile sinks are needed in many sensor network applications for efficient data collection, data querying, localized sensor reprogramming, identifying and revoking compromised sens...
Wensheng Zhang, Hui Song, Sencun Zhu, Guohong Cao