Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
CISS
2011
IEEE
9 years 4 months ago
Anti-jamming performance of cognitive radio networks
In this paper, we study both the jamming capability of the cognitiveradio-based jammers and the anti-jamming capability of the cognitive radio networks. We first setup the models...
Xiaohua Li, Wednel Cadeau
CCS
2003
ACM
10 years 6 months ago
Learning attack strategies from intrusion alerts
Understanding the strategies of attacks is crucial for security applications such as computer and network forensics, intrusion response, and prevention of future attacks. This pap...
Peng Ning, Dingbang Xu
ESORICS
2004
Springer
10 years 6 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee
ICC
2007
IEEE
10 years 7 months ago
On the Risk-Based Operation of Mobile Attacks in Wireless Ad Hoc Networks
—In this paper we study the propagation of malicious software in wireless ad hoc networks under a probabilistic framework. We design topology control algorithms for the developme...
Vasileios Karyotis, Symeon Papavassiliou, Mary Gra...
books