Sciweavers

5234 search results - page 17 / 1047
» Simulation of Computer Network Attacks
Sort
View
GLOBECOM
2010
IEEE
13 years 7 months ago
Cross-Layer Attack and Defense in Cognitive Radio Networks
The existing research on security issues in cognitive radio networks mainly focuses on attack and defense in individual network layers. However, the attackers do not necessarily re...
Wenkai Wang, Yan Sun, Husheng Li, Zhu Han
AINA
2010
IEEE
13 years 19 days ago
A Novel Cross Layer Intrusion Detection System in MANET
— Intrusion detection System forms a vital component of internet security. To keep pace with the growing trends, there is a critical need to replace single layer detection techno...
Rakesh Shrestha, Kyong-Heon Han, Dong-You Choi, Se...
HICSS
2002
IEEE
123views Biometrics» more  HICSS 2002»
14 years 1 months ago
On the Performance of a Survivability Architecture for Networked Computing Systems
This research focuses on the performance and timing behavior of a two level survivability architecture. The lower level of the architecture involves attack analysis based on kernel...
William S. Harrison, Axel W. Krings, Nadine Hanebu...
PDCAT
2004
Springer
14 years 2 months ago
Attack Resiliency of Network Topologies
Network topology has no direct effect on the correctness of network protocols, however, it influences on the performance of networks and the survivability of the networks under at...
Heejo Lee, Jong Kim
CORR
2010
Springer
153views Education» more  CORR 2010»
13 years 9 months ago
Secured Greedy Perimeter Stateless Routing for Wireless Sensor Networks
Wireless sensor networks are collections of large number of sensor nodes. The sensor nodes are featured with limited energy, computation and transmission power. Each node in the n...
P. Samundiswary, D. Sathian, P. Dananjayan