Sciweavers

54 search results - page 10 / 11
» Towards the impact of the operational environment on the sec...
Sort
View
WOWMOM
2005
ACM
201views Multimedia» more  WOWMOM 2005»
13 years 11 months ago
Real-Time Intrusion Detection for Ad Hoc Networks
A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols de...
Ioanna Stamouli, Patroklos G. Argyroudis, Hitesh T...
MOBIHOC
2007
ACM
14 years 4 months ago
Surviving attacks on disruption-tolerant networks without authentication
Disruption-Tolerant Networks (DTNs) deliver data in network environments composed of intermittently connected nodes. Just as in traditional networks, malicious nodes within a DTN ...
John Burgess, George Dean Bissias, Mark D. Corner,...
ICN
2009
Springer
13 years 10 months ago
New Algorithm for the Design of Topology Aware Hypercube in Multi-hop Ad Hoc Networks
Securing group communications in resource constrained, infrastructure-less environments such as Mobile Ad Hoc Networks (MANETs) has become one of the most challenging research dire...
Maria Striki, Kyriakos Manousakis, John S. Baras
SASO
2010
IEEE
13 years 3 months ago
VCAE: A Virtualization and Consolidation Analysis Engine for Large Scale Data Centers
Server consolidation through virtualization is becoming an effective way to save power and space in enterprise data centers. However, it also brings additional operational risks f...
Haifeng Chen, Hui Kang, Guofei Jiang, Kenji Yoshih...
WINET
2010
179views more  WINET 2010»
13 years 3 months ago
Achieving robust message authentication in sensor networks: a public-key based approach
Given the extremely limited hardware resources on sensor nodes and the inclement deploying environment, the adversary Denial-of-Service (DoS) attack becomes a serious security thre...
Haodong Wang, Qun Li