Sciweavers

5234 search results - page 37 / 1047
» Simulation of Computer Network Attacks
Sort
View
IJDSN
2006
136views more  IJDSN 2006»
13 years 9 months ago
Intrusion Detection for Routing Attacks in Sensor Networks
Security is a critical challenge for creating robust and reliable sensor networks. For example, routing attacks have the ability to disconnect a sensor network from its central ba...
Chong Eik Loo, Mun Yong Ng, Christopher Leckie, Ma...
WISEC
2009
ACM
14 years 3 months ago
An attacker model for MANET routing security
Mobile ad-hoc networks are becoming ever more popular due to their flexibility, low cost, and ease of deployment. However, to achieve these benefits the network must employ a so...
Jared Cordasco, Susanne Wetzel
ICC
2007
IEEE
108views Communications» more  ICC 2007»
14 years 3 months ago
Trust Establishment in Distributed Networks: Analysis and Modeling
— Recently, trust establishment is recognized as an important approach to defend distributed networks, such as mobile ad hoc networks and sensor networks, against malicious attac...
Yan Lindsay Sun, Yafei Yang
BIRTHDAY
2005
Springer
14 years 2 months ago
Temporal Dynamics of Support and Attack Networks: From Argumentation to Zoology
Howard Barringer, Dov M. Gabbay, John Woods