Sciweavers

5234 search results - page 29 / 1047
» Simulation of Computer Network Attacks
Sort
View
GLOBECOM
2008
IEEE
14 years 3 months ago
Jamming ACK Attack to Wireless Networks and a Mitigation Approach
— In many Medium Access Control (MAC) schemes for wireless networks, an Acknowledgment (ACK) packet is transmitted from the data receiver to the data sender to announce the succe...
Zhiguo Zhang, Jingqi Wu, Jing Deng, Meikang Qiu
WSC
2004
13 years 10 months ago
Simulation in Context: Using Data Farming for Decision Support
Data Farming leverages high performance computing to run simple models many times. This process allows for the exploration of massive parameter spaces relatively quickly. This pap...
Philip S. Barry, Matthew T. K. Koehler
AINA
2006
IEEE
14 years 3 months ago
Efficacy of Coordinated Distributed Multiple Attacks (A Proactive Approach to Cyber Defense)
In the network-centric approach to information operations, users share information robustly by means of a secure infrastructure that enables self-synchronization and, ultimately, ...
Patrick Defibaugh-Chavez, Srinivas Mukkamala, Andr...
ACSAC
2004
IEEE
14 years 23 days ago
Using Predators to Combat Worms and Viruses: A Simulation-Based Study
Large-scale attacks generated by fast-spreading or stealthy malicious mobile code, such as flash worms and e-mail viruses, demand new approaches to patch management and disinfecti...
Ajay K. Gupta 0002, Daniel C. DuVarney
SECON
2007
IEEE
14 years 3 months ago
Distinguishing Data Transience from False Injection in Sensor Networks
— Wireless sensor networks are increasingly being employed for potentially hazardous and critical applications such as monitoring the gas concentration levels in a battle field....
Vinod Shukla, Daji Qiao