Sciweavers

5234 search results - page 42 / 1047
» Simulation of Computer Network Attacks
Sort
View
109
Voted
ICNP
2006
IEEE
15 years 8 months ago
Pretty Good BGP: Improving BGP by Cautiously Adopting Routes
— The Internet’s interdomain routing protocol, BGP, is vulnerable to a number of damaging attacks, which often arise from operator misconfiguration. Proposed solutions with st...
Josh Karlin, Stephanie Forrest, Jennifer Rexford
171
Voted
WISEC
2010
ACM
15 years 7 months ago
Secure walking GPS: a secure localization and key distribution scheme for wireless sensor networks
In many applications of wireless sensor networks, sensor nodes are manually deployed in hostile environments where an attacker can disrupt the localization service and tamper with...
Qi Mi, John A. Stankovic, Radu Stoleru
112
Voted
ISCC
2005
IEEE
132views Communications» more  ISCC 2005»
15 years 7 months ago
A Reputation-Based Trust Mechanism for Ad Hoc Networks
— The main characterisrics of ad hoc networks are the lack of predefined infrastructure and the dynamic topology. These characteristics present some new security vulnerabilities...
Yacine Rebahi, Vicente E. Mujica V, Dorgham Sisale...
PATMOS
2007
Springer
15 years 8 months ago
Computation of Joint Timing Yield of Sequential Networks Considering Process Variations
Amit Goel, Sarvesh Bhardwaj, Praveen Ghanta, Sarma...
SIMUTOOLS
2008
15 years 3 months ago
Realistic simulation environments for IP-based networks
During development of new protocols and systems researchers in most cases use simulations for evaluation of their product, especially in the area of communication networks. The qu...
Thomas Gamer, Michael Scharf