Sciweavers

5234 search results - page 80 / 1047
» Simulation of Computer Network Attacks
Sort
View
RAID
2010
Springer
13 years 7 months ago
Anomaly Detection and Mitigation for Disaster Area Networks
Abstract. One of the most challenging applications of wireless networking are in disaster area networks where lack of infrastructure, limited energy resources, need for common oper...
Jordi Cucurull, Mikael Asplund, Simin Nadjm-Tehran...
ICDCS
2007
IEEE
14 years 3 months ago
Resilient Cluster Formation for Sensor Networks
Sensor nodes are often organized into clusters to facilitate many network operations such as data aggregation. Clustering has to be protected in hostile environments. Otherwise, a...
Donggang Liu
ICNP
2006
IEEE
14 years 3 months ago
TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks
— In a wormhole attack, wireless transmissions are recorded at one location and replayed at another, creating a virtual link under attacker control. Proposed countermeasures to t...
Jakob Eriksson, Srikanth V. Krishnamurthy, Michali...
ATAL
2003
Springer
14 years 2 months ago
A prototype multiAgent network security system
Distributed Internet-based attacks on computer systems are becoming more prevalent. These attacks usually employ some form of automation and involve the compromise of many systems...
Taraka Pedireddy, José M. Vidal
PADS
2009
ACM
14 years 4 months ago
Real-Time Security Exercises on a Realistic Interdomain Routing Experiment Platform
We use a realistic interdomain routing experiment platform to conduct real-time attack and defense exercises for training purposes. Our interdomain routing experiment platform int...
Yue Li, Michael Liljenstam, Jason Liu