Sciweavers

3319 search results - page 3 / 664
» The topology of dark networks
Sort
View
DIMVA
2007
13 years 7 months ago
Characterizing Dark DNS Behavior
Security researchers and network operators increasingly rely on information gathered from honeypots and sensors deployed on darknets, or unused address space, for attack detection....
Jon Oberheide, Manish Karir, Zhuoqing Morley Mao
NSPW
2006
ACM
13 years 11 months ago
Dark application communities
In considering new security paradigms, it is often worthwhile to anticipate the direction and nature of future attack paradigms. We identify a class of attacks based on the idea o...
Michael E. Locasto, Angelos Stavrou, Angelos D. Ke...
INFOCOM
2012
IEEE
11 years 8 months ago
Robust topology control in multi-hop cognitive radio networks
—The opening of under-utilized spectrum creates the opportunity of substantial performance improvement through cognitive radio techniques. However, the real network performance m...
Jing Zhao, Guohong Cao
ICCS
2007
Springer
13 years 12 months ago
Genetic Algorithmic Topology Control for Two-Tiered Wireless Sensor Networks
This paper proposes an optimized topology control scheme
Donghwan Lee, Wonjun Lee, Joongheon Kim
ISCC
2008
IEEE
254views Communications» more  ISCC 2008»
14 years 5 days ago
Mesh Topology Viewer (MTV): an SVG-based interactive mesh network topology visualization tool
—This paper discusses wireless mesh network topology visualization tools and their requirements. It presents an interactive tool for visualizing mesh network topologies. The prop...
Rafael De T. Valle, Diego G. Passos, Célio ...