Sciweavers

394 search results - page 38 / 79
» The wireless control network: Monitoring for malicious behav...
Sort
View
TWC
2008
154views more  TWC 2008»
13 years 8 months ago
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen...
GLOBECOM
2007
IEEE
14 years 3 months ago
Enhanced Adaptive Frequency Hopping for Wireless Personal Area Networks in a Coexistence Environment
— In this paper, we present an enhanced adaptive frequency hopping (EAFH) mechanism for improving the performance of frequency hopping-based wireless personal area networks (WPAN...
Alex Chia-Chun Hsu, David S. L. Wei, C. C. Jay Kuo...
WSC
1997
13 years 10 months ago
A Performance Monitoring Application for Distributed Interactive Simulations (DIS)
This paper discusses the design, development, and use of a performance monitoring tool for Distributed Interactive Simulations (DIS). A typical DIS environment consists of hundred...
David B. Cavitt, C. Michael Overstreet, Kurt Maly
ACSC
2004
IEEE
14 years 12 days ago
Kerberos Assisted Authentication in Mobile Ad-hoc Networks
An ad-hoc network comprises mobile nodes that cooperate with each other using wireless connections to route both data and control packets within the network. As the low transmissi...
Asad Amir Pirzada, Chris McDonald
VIZSEC
2005
Springer
14 years 2 months ago
A Visualization Methodology for Characterization of Network Scans
Many methods have been developed for monitoring network traffic, both using visualization and statistics. Most of these methods focus on the detection of suspicious or malicious ...
Chris Muelder, Kwan-Liu Ma, Tony Bartoletti