Sciweavers

83 search results - page 16 / 17
» MOVE: An End-to-End Solution to Network Denial of Service
Sort
View
DAIS
2001
13 years 7 months ago
Sentient Computing for Everyone
: Sentient Computing gives perception to computing systems so that they can detect, interpret and respond to changing aspects of users' context. The location attribute of a us...
Diego López de Ipiña, Sai Lai Lo
AINA
2005
IEEE
13 years 11 months ago
Sensor Inter-Vehicle Communication for Safer Highways
In this paper we present a sensor inter-vehicle communication protocol based on geographical routing. Sensors installed in cars continuously gather important information about: ai...
Mimoza Durresi, Arjan Durresi, Leonard Barolli
WISA
2009
Springer
14 years 17 days ago
Securing Remote Access Inside Wireless Mesh Networks
Wireless mesh networks (WMNs) that are being increasingly deployed in communities and public places provide a relatively stable routing infrastructure and can be used for diverse c...
Mark Manulis
SERSCISA
2009
Springer
14 years 15 days ago
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promi...
Yongjin Kim
IJNSEC
2006
200views more  IJNSEC 2006»
13 years 6 months ago
3G and WLAN Interworking Security: Current Status and Key
The third-generation (3G) mobile communication systems provide great coverage, complete subscriber management and nearly universal roaming. Nevertheless, 3G systems are subject to...
Chou Chen Yang, Kuan-Hao Chu, Ya-Wen Yang