Sciweavers

20 search results - page 4 / 4
» An Intrusion Detection Tool for AODV-Based Ad hoc Wireless N...
Sort
View
ICC
2009
IEEE
157views Communications» more  ICC 2009»
13 years 11 months ago
Transmission Capacity of Wireless Ad Hoc Networks: Successive Interference Cancellation vs. Joint Detection
Abstract—The performance benefits of two interference cancellation methods, successive interference cancellation (SIC) and joint detection (JD), in wireless ad hoc networks are ...
Joseph Blomer, Nihar Jindal
SASN
2006
ACM
13 years 10 months ago
Impact of optimal MAC layer attacks on the network layer
Node misbehavior in wireless ad hoc networks leads to sudden unpredictable changes in network topology, resulting in fluctuation of traffic load and capacity for already existin...
Svetlana Radosavac, John S. Baras, George V. Moust...
CNSR
2007
IEEE
13 years 11 months ago
Testing Intrusion Detection Systems in MANET: A Comprehensive Study
In this paper, we study the problem of testing Intrusion Detection Systems (IDS) in Mobile Ad hoc Networks (MANET). Testing is achieved by simulating different measurements. We mo...
Hadi Otrok, Joey Paquet, Mourad Debbabi, Prabir Bh...
ICC
2007
IEEE
173views Communications» more  ICC 2007»
13 years 11 months ago
Using Incompletely Cooperative Game Theory in Mobile Ad Hoc Networks
—Recently, game theory becomes a useful and powerful tool to research mobile ad hoc networks (MANETs). Wireless LANs (WLANs) can work under both infrastructure and ad hoc modes, ...
Liqiang Zhao, Jie Zhang, Kun Yang, Hailin Zhang
WORDS
2005
IEEE
13 years 10 months ago
An Adaptable Security Framework for Service-based Systems
A major advantage of service-based computing technology is the ability to enable rapid formation of large-scale distributed systems by composing massively available services to ac...
Stephen S. Yau, Yisheng Yao, Zhaoji Chen, Luping Z...