Sciweavers

13007 search results - page 2218 / 2602
» Wireless and Mobile Networking
Sort
View
142
Voted
WCNC
2010
IEEE
15 years 8 months ago
MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks
—The Disruption Tolerant Networks (DTNs) are vulnerable to insider attacks, in which the legitimate nodes are compromised and the adversary modifies the delivery metrics of the ...
Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Ch...
EURONGI
2004
Springer
15 years 8 months ago
Performance of Different Proxy Concepts in UMTS Networks
It is well known that the large round trip time and the highly variable delay in a cellular network may degrade the performance of TCP. Many concepts have been proposed to improve ...
Marc Necker, Michael Scharf, Andreas Weber 0003
ICINCO
2004
122views Robotics» more  ICINCO 2004»
15 years 6 months ago
Data Security Considerations in Modern Automation Networks
: The automation manufacturing business has reached its turning point and manufacturers are forced to create new business areas. Their expertise about field devices will be the sou...
Mikko Salmenperä, Jari Seppälä
AINA
2009
IEEE
15 years 2 months ago
Approximating Travel Times Using Opportunistic Networking
Determining the time and means by which to travel from location A to location B for a person utilising a MANET requires the dissemination of both realtime and historic data. In thi...
Rudi Ball, Naranker Dulay
TMC
2011
164views more  TMC 2011»
14 years 11 months ago
Security Games for Vehicular Networks
—Vehicular networks (VANETs) can be used to improve transportation security, reliability, and management. This paper investigates security aspects of VANETs within a game-theoret...
Tansu Alpcan, Sonja Buchegger
« Prev « First page 2218 / 2602 Last » Next »