Sciweavers

702 search results - page 94 / 141
» An overlay approach to data security in ad-hoc networks
Sort
View
WINET
2010
179views more  WINET 2010»
14 years 8 months ago
Achieving robust message authentication in sensor networks: a public-key based approach
Given the extremely limited hardware resources on sensor nodes and the inclement deploying environment, the adversary Denial-of-Service (DoS) attack becomes a serious security thre...
Haodong Wang, Qun Li
DATE
2010
IEEE
197views Hardware» more  DATE 2010»
14 years 4 months ago
Compilation of stream programs for multicore processors that incorporate scratchpad memories
The stream processing characteristics of many embedded system applications in multimedia and networking domains have led to the advent of stream based programming formats. Several ...
Weijia Che, Amrit Panda, Karam S. Chatha
CNSR
2004
IEEE
174views Communications» more  CNSR 2004»
15 years 1 months ago
Network Intrusion Detection Using an Improved Competitive Learning Neural Network
This paper presents a novel approach for detecting network intrusions based on a competitive learning neural network. In the paper, the performance of this approach is compared to...
John Zhong Lei, Ali A. Ghorbani
GLOBECOM
2008
IEEE
14 years 11 months ago
Evaluating P2PSIP under Attack: An Emulative Study
— Recently, establishing a VoIP call using a P2P network instead of regular SIP-servers has been proposed; this novel approach to SIP-signaling is commonly referred to as P2PSIP ...
Jan Seedorf, Frank Ruwolt, Martin Stiemerling, Sav...
ITNG
2007
IEEE
15 years 4 months ago
Securing MPLS Networks with Multi-path Routing
— MPLS security is an evolving issue which has been raised by many researchers and service providers. The basic architecture of MPLS network does not provide security services su...
Sahel Alouneh, Abdeslam En-Nouaary, Anjali Agarwal