Sciweavers

394 search results - page 26 / 79
» The wireless control network: Monitoring for malicious behav...
Sort
View
JCM
2006
73views more  JCM 2006»
13 years 8 months ago
Wireless Networks Revenue Optimization through Overload Control with Priority Services
Wireless networks are currently experiencing more overload situations than their wireline counterparts because of explosive mobile traffic growth, unpredictable traffic behavior, s...
Haitao Lin, Preetam Ghosh, Prabir Das
INFOCOM
2007
IEEE
14 years 2 months ago
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks
Abstract— We consider a scenario where a sophisticated jammer jams an area in a single-channel wireless sensor network. The jammer controls the probability of jamming and transmi...
Mingyan Li, Iordanis Koutsopoulos, Radha Poovendra...
GLOBECOM
2009
IEEE
13 years 6 months ago
Secure Unified Cellular Ad Hoc Network Routing
Abstract--Previous simulations have shown substantial performance gains can be achieved by using hybrid cellular and wireless LAN (WLAN) approaches [1]. In a hybrid system, a proxy...
Jason J. Haas, Yih-Chun Hu
JIPS
2006
110views more  JIPS 2006»
13 years 8 months ago
Monitoring Systems for Embedded Equipment in Ubiquitous Environments
: Accurate and efficient monitoring of dynamically changing environments is one of the most important requirements for ubiquitous network environments. Ubiquitous computing provide...
Ji-Hye Bae, Hee-Kuk Kang, Yoon-Young Park, Jung-Ho...
RAID
2005
Springer
14 years 2 months ago
Virtual Playgrounds for Worm Behavior Investigation
To detect and defend against Internet worms, researchers have long hoped to have a safe convenient environment to unleash and run real-world worms for close observation of their in...
Xuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H....