Sciweavers

5234 search results - page 157 / 1047
» Simulation of Computer Network Attacks
Sort
View
ICNSC
2007
IEEE
14 years 4 months ago
Adaptive Network Flow Clustering
— Flow level measurements are used to provide insights into the traffic flow crossing a network link. However, existing flow based network detection devices lack adaptive reconfi...
Sui Song, Zhixiong Chen
WSC
2007
13 years 12 months ago
Analyzing air combat simulation results with dynamic Bayesian networks
In this paper, air combat simulation data is reconstructed into a dynamic Bayesian network. It gives a compact probabilistic model that describes the progress of air combat and al...
Jirka Poropudas, Kai Virtanen
CSE
2009
IEEE
14 years 4 months ago
Key Predistribution Schemes Using Block Designs in Wireless Sensor Networks
We present a deterministic Key Predistribution scheme in Wireless Sensor Networks (WSN) using combinatorial designs. The design finds application where a large number sensor node...
Sushmita Ruj, Jennifer Seberry, Bimal K. Roy
NDSS
2007
IEEE
14 years 3 months ago
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces
Encouraging the release of network data is central to promoting sound network research practices, though the publication of this data can leak sensitive information about the publ...
Scott E. Coull, Charles V. Wright, Fabian Monrose,...
AINA
2009
IEEE
14 years 2 months ago
A New Method of Proactive Recovery Mechanism for Large-Scale Network Failures
—This paper proposes a novel recovery mechanism from large-scale network failures caused by earthquakes, terrorist attacks, large-scale power outages and software bugs. Our metho...
Takuro Horie, Go Hasegawa, Satoshi Kamei, Masayuki...