In many networks, such as mobile ad-hoc networks and friend-to-friend overlay networks, direct communication between nodes is limited to specific neighbors. Often these networks ...
Nathan S. Evans, Chris GauthierDickey, Christian G...
In our present work we introduce the use of data fusion in the field of DoS anomaly detection. We present DempsterShafer’s Theory of Evidence (D-S) as the mathematical foundati...
In this paper, we describe an ongoing effort to define common APIs ctured peer-to-peer overlays and the key abstractions that can be built on them. In doing so, we hope to facilit...
Frank Dabek, Ben Y. Zhao, Peter Druschel, John Kub...
As the Internet grows and network bandwidth continues to increase, administrators are faced with the task of keeping confidential information from leaving their networks. Today...
In wireless sensor networks data propagation is usually performed by sensors transmitting data towards a static control center (sink). Inspired by important applications (mostly r...
Ioannis Chatzigiannakis, Athanasios Kinalis, Sotir...