Sciweavers

46 search results - page 3 / 10
» Verify Results of Network Intrusion Alerts Using Lightweight...
Sort
View
ACSAC
2006
IEEE
13 years 9 months ago
Specification-Based Intrusion Detection in WLANs
Wireless networking technologies based on the IEEE 802.11 series of standards fail to authenticate management frames and network card addresses and suffer from serious vulnerabili...
Rupinder Gill, Jason Smith, Andrew Clark
ICDCS
2003
IEEE
13 years 11 months ago
Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies
With the proliferation of wireless devices, mobile ad hoc networking (MANET) has become a very exciting and important technology due to its characteristics of open medium and dyna...
Yi-an Huang, Wei Fan, Wenke Lee, Philip S. Yu
DISCEX
2003
IEEE
13 years 11 months ago
Detecting Spoofed Packets
Packets sent using the IP protocol include the IP address of the sending host. The recipient directs replies to the sender using this source address. However, the correctness of t...
Steven J. Templeton, Karl E. Levitt
CBSE
2005
Springer
13 years 11 months ago
Performance Prediction of J2EE Applications Using Messaging Protocols
Abstract. Predicting the performance of component-based applications is difficult due to the complexity of the underlying component technology. This problem is exacerbated when a m...
Yan Liu, Ian Gorton
ICC
2007
IEEE
175views Communications» more  ICC 2007»
14 years 3 days ago
Adaptive Range-Based Power Control for Collision Avoidance in Wireless Ad Hoc Networks
—The paper analyzes the relationships among the transmission range, carrier sensing range, and interference range in case that power control is adopted and proposes an adaptive r...
Kuei-Ping Shih, Yen-Da Chen, Chau-Chieh Chang