Sciweavers

194 search results - page 36 / 39
» Wireless Intrusion Detection and Response
Sort
View
INFOCOM
2003
IEEE
14 years 1 months ago
Responding to Spurious Timeouts in TCP
- Delays on Internet paths, especially including wireless links, can be highly variable. On the other hand, a current trend for modern TCPs is to deploy a fine-grain retransmission...
Andrei Gurtov, Reiner Ludwig
RTCSA
2005
IEEE
14 years 2 months ago
An Overview of the VigilNet Architecture
Battlefield surveillance often involves a high element of risk for military operators. Hence, it is very important for the military to execute unmanned surveillance by using larg...
Tian He, Liqian Luo, Ting Yan, Lin Gu, Qing Cao, G...
ICC
2008
IEEE
123views Communications» more  ICC 2008»
14 years 3 months ago
A Physical-Layer Technique to Enhance Authentication for Mobile Terminals
Abstract— We propose an enhanced physical-layer authentication scheme for multi-carrier wireless systems, where transmission bursts consist of multiple frames. More specifically...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...
RTSS
2003
IEEE
14 years 1 months ago
JAM: A Jammed-Area Mapping Service for Sensor Networks
Preventing denial-of-service attacks in wireless sensor networks is difficult primarily because of the limited resources available to network nodes and the ease with which attacks...
Anthony D. Wood, John A. Stankovic, Sang Hyuk Son
WICOMM
2002
121views more  WICOMM 2002»
13 years 8 months ago
Open issues on TCP for mobile computing
We discuss the design principles of TCP within the context of heterogeneous wired/wireless networks and mobile networking. We identify three shortcomings in TCP's behavior: (...
Vassilios Tsaoussidis, Ibrahim Matta