Sciweavers

394 search results - page 8 / 79
» The wireless control network: Monitoring for malicious behav...
Sort
View
IEEECIT
2010
IEEE
13 years 7 months ago
Research on Key Technologies of Building Home Control Based on the Wireless Network
: Relatively higher cost, worse extensibility of the monitoring points and weaker mobility are those disadvantages that widely exist in the wire data collection system of the tradi...
Si-You Xiao, Xuan Zhang
ISCAPDCS
2001
13 years 10 months ago
A Study of Parallel Monitoring Algorithm in ATM Network Admission Control
Admission control strategies play an important role in congestion control and in guaranteeing the quality of service in Asynchronous Transfer Mode (ATM) networks. Three categories...
Mansoor Alam, Carl Weisfelder, Min Song
ICC
2007
IEEE
14 years 2 months ago
On the Risk-Based Operation of Mobile Attacks in Wireless Ad Hoc Networks
—In this paper we study the propagation of malicious software in wireless ad hoc networks under a probabilistic framework. We design topology control algorithms for the developme...
Vasileios Karyotis, Symeon Papavassiliou, Mary Gra...
ISCC
2005
IEEE
132views Communications» more  ISCC 2005»
14 years 2 months ago
A Reputation-Based Trust Mechanism for Ad Hoc Networks
— The main characterisrics of ad hoc networks are the lack of predefined infrastructure and the dynamic topology. These characteristics present some new security vulnerabilities...
Yacine Rebahi, Vicente E. Mujica V, Dorgham Sisale...
DATE
2005
IEEE
154views Hardware» more  DATE 2005»
14 years 2 months ago
Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring
— Security is emerging as an important concern in embedded system design. The security of embedded systems is often compromised due to vulnerabilities in “trusted” software t...
Divya Arora, Srivaths Ravi, Anand Raghunathan, Nir...