Sciweavers

394 search results - page 18 / 79
» The wireless control network: Monitoring for malicious behav...
Sort
View
CORR
2010
Springer
189views Education» more  CORR 2010»
13 years 8 months ago
ACRR: Ad Hoc On-Demand Distance Vector Routing with Controlled Route Requests
Reactive routing protocols like Ad-hoc On-Demand Distance Vector Routing (AODV) and Dynamic Source Routing in Ad-Hoc Wireless Networks (DSR) which are used in Mobile and Ad-hoc Ne...
Jayesh Kataria, P. S. Dhekne, Sugata Sanyal
NSDI
2004
13 years 10 months ago
OSPF Monitoring: Architecture, Design, and Deployment Experience
Improving IP control plane (routing) robustness is critical to the creation of reliable and stable IP services. Yet very few tools exist for effective IP route monitoring and mana...
Aman Shaikh, Albert G. Greenberg
VTC
2007
IEEE
116views Communications» more  VTC 2007»
14 years 2 months ago
Fairness Control by Mobile Routers in On-Board Communication Networks
— Communication solutions for passengers on public transport vehicles, in the form of on-board networks connected to the Internet via a mobile router (MR) and a wireless link, are...
Adeel Baig, Lavy Libman, Mahbub Hassan
IADIS
2003
13 years 10 months ago
A Framework of High Confidence E-Healthcare Information System
In this paper a framework for a high-confidence e-healthcare information system which meets five criteria including availability, reliability, security, survivability and restorab...
Shun-Chieh Lin, Wen-Hsiang Tsai, Shian-Shyong Tsen...
IPPS
2006
IEEE
14 years 2 months ago
Detecting selective forwarding attacks in wireless sensor networks
Selective forwarding attacks may corrupt some missioncritical applications such as military surveillance and forest fire monitoring. In these attacks, malicious nodes behave like...
Bo Yu, Bin Xiao