— We consider the fading broadcast channel from a secrecy point of view. In this channel, each user views the other user as an eavesdropper, and wants to keep its information as ...
—Flash-crowd attacks are the most vicious form of distributed denial of service (DDoS). They flood the victim with service requests generated from numerous bots. Attack requests...
—In host-based intrusion detection systems (HIDS), anomaly detection involves monitoring for significant deviations from normal system behavior. Hidden Markov Models (HMMs) have...
Wael Khreich, Eric Granger, Robert Sabourin, Ali M...
—Following the design philosophy of XCP, VCP is a router-assisted congestion protocol that intends to balance the efficiency and the fairness control in high Bandwidth-Delay Pro...
CDMA2000, WCDMA and WiMAX are three widely used 3G technologies. Since they share the same goal, which is to provide broader coverage and higher throughput in 3G networks, an impar...