Sciweavers

282 search results - page 34 / 57
» Anomaly detection in a mobile communication network
Sort
View
WCNC
2008
IEEE
15 years 4 months ago
Developing Security Solutions for Wireless Mesh Enterprise Networks
—Our study on the deployment topology and communication characteristics of wireless mesh enterprise networks (WMENs) leads to three critical security challenges: (a) deployment o...
Md. Abdul Hamid, Md. Shariful Islam, Choong Seon H...
VIZSEC
2004
Springer
15 years 3 months ago
Passive visual fingerprinting of network attack tools
This paper examines the dramatic visual fingerprints left by a wide variety of popular network attack tools in order to better understand the specific methodologies used by attack...
Gregory J. Conti, Kulsoom Abdullah
GLOBECOM
2009
IEEE
15 years 1 months ago
Detecting Identity Spoofs in IEEE 802.11e Wireless Networks
Abstract--Wireless networks are vulnerable to identity spoofing attacks, where an attacker can forge the MAC address of his wireless device to assume the identity of another victim...
Gayathri Chandrasekaran, John-Austen Francisco, Vi...
VTC
2007
IEEE
117views Communications» more  VTC 2007»
15 years 4 months ago
Distributed Iterative Detection in an Interference Limited Cellular Network
—This paper presents a novel strategy for interference mitigation in an uplink of high reuse cellular networks through distributive processing. It is proposed that the neighborin...
Shahid Khattak, Gerhard Fettweis
WIMOB
2008
IEEE
15 years 4 months ago
Exploiting Self-Reported Social Networks for Routing in Ubiquitous Computing Environments
— Mobile, delay-tolerant, ad hoc and pocket-switched networks may form an important part of future ubiquitous computing environments. Understanding how to efficiently and effect...
Greg Bigwood, D. Rehunathan, Martin Bateman, Trist...