Sciweavers

5234 search results - page 42 / 1047
» Simulation of Computer Network Attacks
Sort
View
ICNP
2006
IEEE
14 years 3 months ago
Pretty Good BGP: Improving BGP by Cautiously Adopting Routes
— The Internet’s interdomain routing protocol, BGP, is vulnerable to a number of damaging attacks, which often arise from operator misconfiguration. Proposed solutions with st...
Josh Karlin, Stephanie Forrest, Jennifer Rexford
WISEC
2010
ACM
14 years 1 months ago
Secure walking GPS: a secure localization and key distribution scheme for wireless sensor networks
In many applications of wireless sensor networks, sensor nodes are manually deployed in hostile environments where an attacker can disrupt the localization service and tamper with...
Qi Mi, John A. Stankovic, Radu Stoleru
ISCC
2005
IEEE
132views Communications» more  ISCC 2005»
14 years 2 months ago
A Reputation-Based Trust Mechanism for Ad Hoc Networks
— The main characterisrics of ad hoc networks are the lack of predefined infrastructure and the dynamic topology. These characteristics present some new security vulnerabilities...
Yacine Rebahi, Vicente E. Mujica V, Dorgham Sisale...
PATMOS
2007
Springer
14 years 3 months ago
Computation of Joint Timing Yield of Sequential Networks Considering Process Variations
Amit Goel, Sarvesh Bhardwaj, Praveen Ghanta, Sarma...
SIMUTOOLS
2008
13 years 10 months ago
Realistic simulation environments for IP-based networks
During development of new protocols and systems researchers in most cases use simulations for evaluation of their product, especially in the area of communication networks. The qu...
Thomas Gamer, Michael Scharf