Sciweavers

AIMS
2015
Springer
8 years 5 months ago
Characterizing the IPv6 Security Landscape by Large-Scale Measurements
Networks are transitioning from IP version 4 to the new version 6. Fundamental differences in the protocols introduce new security challenges with varying levels of evidence. As e...
Luuk Hendriks, Anna Sperotto, Aiko Pras
AIMS
2015
Springer
8 years 5 months ago
How Asymmetric Is the Internet? - A Study to Support the Use of Traceroute
A network path is a path that a packet takes to reach its target. However, determining the network path that a host uses to reach it’s target from the viewpoint of the latter is ...
Wouter Willem de Vries, José Jair Santanna,...
ADHOCNOW
2015
Springer
8 years 5 months ago
Election-Based Sensor Deployment and Coverage Maintenance by a Team of Robots
Wireless sensor and robot networks (WSRNs) are an integration of wireless sensor network (WSNs) and multi-robot systems. They are comprised of networked sensor and mobile robots th...
Qiao Li, Venkat Narasimhan, Amiya Nayak
ADHOCNOW
2015
Springer
8 years 5 months ago
Self-organised Key Management for the Smart Grid
As Smart Grid deployments emerge around the world, their protection against cyberattacks becomes more crucial. Before protective measures are put into place, one of the main factor...
Foivos F. Demertzis, Georgios Karopoulos, Christos...
ADHOCNETS
2015
Springer
8 years 5 months ago
SLACK-MAC: Adaptive MAC Protocol for Low Duty-Cycle Wireless Sensor Networks
—Wireless sensor networks (WSNs) are increasingly used in environmental monitoring applications. They are designed to operate for several months by featuring low activity cycles,...
Affoua Thérèse Aby, Alexandre Guitto...
ADHOCNETS
2015
Springer
8 years 5 months ago
From the Characterization of Ranging Error to the Enhancement of Nodes Localization for Group of Wireless Body Area Networks
Time-based localization in Wireless Body Area Networks (WBANs), has attracted growing research interest for the last past years. Nodes positions can be estimated based on peer-to-p...
Anis Ouni, Jihad Hamie, Claude Chaudet, Arturo Gui...
PERCOM
2016
ACM
8 years 5 months ago
A machine-learning based approach to privacy-aware information-sharing in mobile social networks
Contextual information about users is increasingly shared on mobile social networks. Examples of such information include users’ locations, events, activities, and the co-presen...
Igor Bilogrevic, Kévin Huguenin, Berker Agi...
PERCOM
2016
ACM
8 years 5 months ago
Robust and ubiquitous smartphone-based lane detection
Lane-level positioning is required for several location-based services such as advanced driver assistance systems, driverless cars, predicting driver’s intent, among many other ...
Heba Aly, Anas Basalamah, Moustafa Youssef
PAM
2016
Springer
8 years 5 months ago
Detecting DNS Root Manipulation
We present techniques for detecting unauthorized DNS root servers in the Internet using primarily endpoint-based measurements from RIPE Atlas, supplemented with BGP routing announc...
Ben Jones, Nick Feamster, Vern Paxson, Nicholas We...
PAM
2016
Springer
8 years 5 months ago
Modeling HTTP/2 Speed from HTTP/1 Traces
With the standardization of HTTP/2, content providers want to understand the benefits and pitfalls of transitioning to the new stan
Kyriakos Zarifis, Mark Holland, Manish Jain, Ethan...