Sciweavers

263 search results - page 27 / 53
» Adaptive Defense Against Various Network Attacks
Sort
View
93
Voted
AINA
2004
IEEE
15 years 4 months ago
Authenticated Autonomous System Traceback
The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet making the defense against Distributed Denial of Service attacks one of the ha...
Vamsi Paruchuri, Arjan Durresi, Rajgopal Kannan, S...
93
Voted
INFOCOM
2005
IEEE
15 years 6 months ago
Provably competitive adaptive routing
Abstract— An ad hoc wireless network is an autonomous selforganizing system of mobile nodes connected by wireless links where nodes not in direct range communicate via intermedia...
Baruch Awerbuch, David Holmer, Herbert Rubens, Rob...
ICDCS
2012
IEEE
13 years 2 months ago
Securing Virtual Coordinates by Enforcing Physical Laws
—Virtual coordinate systems (VCS) provide accurate estimations of latency between arbitrary hosts on a network, while conducting a small amount of actual measurements and relying...
Jeffrey Seibert, Sheila Becker, Cristina Nita-Rota...
129
Voted
COMCOM
2006
194views more  COMCOM 2006»
15 years 14 days ago
INSENS: Intrusion-tolerant routing for wireless sensor networks
This paper describes an INtrusion-tolerant routing protocol for wireless SEnsor NetworkS (INSENS). INSENS securely and efficiently constructs tree-structured routing for wireless ...
Jing Deng, Richard Han, Shivakant Mishra
86
Voted
EOR
2007
104views more  EOR 2007»
15 years 11 days ago
Optimal resource allocation for security in reliability systems
Recent results have used game theory to explore the nature of optimal investments in the security of simple series and parallel systems. However, it is clearly important in practi...
M. Naceur Azaiez, Vicki M. Bier