Sciweavers

337 search results - page 30 / 68
» Attack Resiliency of Network Topologies
Sort
View
INFOCOM
2009
IEEE
15 years 5 months ago
Capacity Provisioning a Valiant Load-Balanced Network
—Valiant load balancing (VLB), also called two-stage load balancing, is gaining popularity as a routing scheme that can serve arbitrary traffic matrices. To date, VLB network de...
Andrew R. Curtis, Alejandro López-Ortiz
IMC
2003
ACM
15 years 4 months ago
On the number of distributed measurement points for network tomography
Internet topology information is only made available in aggregate form by standard routing protocols. Connectivity information and latency characteristicsmust therefore be inferre...
Joseph Douglas Horton, Alejandro López-Orti...
WINET
2010
199views more  WINET 2010»
14 years 9 months ago
Secure encrypted-data aggregation for wireless sensor networks
This paper proposes a secure encrypted-data aggregation scheme for wireless sensor networks. Our design for data aggregation eliminates redundant sensor readings without using encr...
Shih-I Huang, Shiuhpyng Shieh, J. D. Tygar
BIOWIRE
2007
Springer
15 years 5 months ago
The Topological Fortress of Termites
Abstract. Termites are known for building some of the most elaborate architectures observed in the animal world. We here analyse some topological properties of three dimensional ne...
Andrea Perna, Christian Jost, Sergi Valverde, Jacq...
ALGOSENSORS
2007
Springer
15 years 19 days ago
Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks
Abstract. In this paper, we present an Intrusion Detection System designed for wireless sensor networks and show how it can be configured to detect Sinkhole attacks. A Sinkhole at...
Ioannis Krontiris, Tassos Dimitriou, Thanassis Gia...