Wormhole attack is a severe attack in wireless ad-hoc networks. Most of the previous work eliminate the effect of wormhole attack by examining the distance or communication time o...
In any forensic investigation, planning and analysis activities are required in order to determine what digital media will be seized, what types of information will be sought in t...
Alfred C. Bogen, David A. Dampier, Jeffrey C. Carv...
The paper presents security platform based on agents as an efficient and robust solution for high-performance intrusion detection system designed for deployment on highspeed netw...
1 FPGAs are an appealing solution for the space-based remote sensing applications. However, in a low-earth orbit, configuration bits of SRAM-based FPGAs are susceptible to single-e...
Hamid R. Zarandi, Seyed Ghassem Miremadi, Costas A...
Peer-to-Peer (P2P) system can support service for lots of end users with little hardware investment, which suits for the efforts to lower down the service cost for Multiplayer Onl...
Hai Jin, Hong Yao, Xiaofei Liao, Sirui Yang, Wei L...