Sciweavers

4233 search results - page 710 / 847
» Three Paths to Effectiveness
Sort
View
IWCMC
2006
ACM
15 years 10 months ago
TARP: trust-aware routing protocol
Security is a critical issue in a mobile ad hoc network (MANET). In most of the previous protocols security is an added layer above the routing protocol. We propose a TrustAware R...
Loay Abusalah, Ashfaq A. Khokhar, G. BenBrahim, W....
DSN
2005
IEEE
15 years 10 months ago
ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment
Distributed systems with multiple interacting services, such as distributed e-commerce systems, are suitable targets for malicious attacks because of the potential financial impac...
Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagc...
ICDCS
2005
IEEE
15 years 10 months ago
Enhancing Source-Location Privacy in Sensor Network Routing
— One of the most notable challenges threatening the successful deployment of sensor systems is privacy. Although many privacy-related issues can be addressed by security mechani...
Pandurang Kamat, Yanyong Zhang, Wade Trappe, Celal...
ICDCS
2005
IEEE
15 years 10 months ago
Timer Interaction in Route Flap Damping
Route Flap Damping is a mechanism generally used in network routing protocols. Its goal is to limit the global impact of unstable routes by temporarily suppressing routes with rap...
Beichuan Zhang, Dan Pei, Daniel Massey, Lixia Zhan...
INFOCOM
2005
IEEE
15 years 10 months ago
Distributed algorithms for secure multipath routing
— To proactively defend against intruders from readily jeopardizing single-path data sessions, we propose a distributed secure multipath solution to route data across multiple pa...
Patrick P. C. Lee, Vishal Misra, Dan Rubenstein