Sciweavers

5234 search results - page 82 / 1047
» Simulation of Computer Network Attacks
Sort
View
SASN
2004
ACM
14 years 2 months ago
Resilient aggregation in sensor networks
This paper studies security for data aggregation in sensor networks. Current aggregation schemes were designed without security in mind and there are easy attacks against them. We...
David Wagner
INFOCOM
2005
IEEE
14 years 2 months ago
Provably competitive adaptive routing
Abstract— An ad hoc wireless network is an autonomous selforganizing system of mobile nodes connected by wireless links where nodes not in direct range communicate via intermedia...
Baruch Awerbuch, David Holmer, Herbert Rubens, Rob...
AINA
2005
IEEE
14 years 2 months ago
Performance Comparison of a Web Cache Simulation Framework
L. G. Cárdenas, José A. Gil, Josep D...
AINA
2007
IEEE
14 years 1 months ago
An Inter-Core Communication Enabled Multi-Core Simulator Based on SimpleScalar
Rongrong Zhong, Yongxin Zhu, Weiwei Chen, Minglian...
IPPS
2007
IEEE
14 years 3 months ago
A Global Security Architecture for Intrusion Detection on Computer Networks
— Detecting all kinds of intrusions efficiently requires a global view of the monitored network. Built to increase the security of computer networks, traditional IDS are unfortu...
Abdoul Karim Ganame, Julien Bourgeois, Renaud Bido...