Sciweavers

5234 search results - page 51 / 1047
» Simulation of Computer Network Attacks
Sort
View
GLOBECOM
2010
IEEE
13 years 7 months ago
Attack-Resistant Collaboration in Wireless Video Streaming Social Networks
Users using the same video streaming service within a wireless network share the same limited backbone bandwidth to the Internet. These users are motivated to collaborate with eac...
W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu
ICC
2009
IEEE
233views Communications» more  ICC 2009»
14 years 3 months ago
Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks
— In this paper, we present an analytical model as well as a practical mechanism to detect denial of service (DoS) attacks on secondary users in dynamic spectrum access (DSA) net...
Z. Jin, S. Anand, K. P. Subbalakshmi
IJON
2000
69views more  IJON 2000»
13 years 9 months ago
PARALLEL NEUROSYS: A system for the simulation of very large networks of biologically accurate neurons on parallel computers
We present a software package for the simulation of very large neuronal networks on parallel computers. The package can be run on any system with an implementation of the Message ...
Peter Pacheco, Marcelo Camperi, Toshi Uchino
EUROPAR
2007
Springer
14 years 29 days ago
Efficient Parallel Simulation of Large-Scale Neuronal Networks on Clusters of Multiprocessor Computers
To understand the principles of information processing in the brain, we depend on models with more than 105 neurons and 109 connections. These networks can be described as graphs o...
Hans E. Plesser, Jochen M. Eppler, Abigail Morriso...
JCM
2008
77views more  JCM 2008»
13 years 9 months ago
In-Field Attack Proof of Injected False Data in Sensor Networks
In a large-scale sensor network individual sensors can be compromised to inject bogus sensing reports. While SEF can filter out the outfield false reports, it is incapable of detec...
Zheng Wang, Xiaodong Lee, Xinchang Zhang, Baoping ...