Sciweavers

2503 search results - page 106 / 501
» Building Computer Network Attacks
Sort
View
118
Voted
CORR
2010
Springer
153views Education» more  CORR 2010»
15 years 2 months ago
Secured Greedy Perimeter Stateless Routing for Wireless Sensor Networks
Wireless sensor networks are collections of large number of sensor nodes. The sensor nodes are featured with limited energy, computation and transmission power. Each node in the n...
P. Samundiswary, D. Sathian, P. Dananjayan
104
Voted
BIOWIRE
2007
Springer
15 years 9 months ago
The Topological Fortress of Termites
Abstract. Termites are known for building some of the most elaborate architectures observed in the animal world. We here analyse some topological properties of three dimensional ne...
Andrea Perna, Christian Jost, Sergi Valverde, Jacq...
PERCOM
2010
ACM
15 years 1 months ago
Crowd-sourcing world models with OpenRoomMap
Abstract—The construction of world models typically requires laborious survey and cataloguing of a building’s contents. OpenRoomMap attempts to crowd-source this information by...
Andrew Colin Rice, Oliver J. Woodman
131
Voted
WS
2005
ACM
15 years 8 months ago
Secure time synchronization service for sensor networks
In this paper, we analyze attacks on existing time synchronization protocols for wireless sensor networks. We propose a secure time synchronization toolbox to counter these attack...
Saurabh Ganeriwal, Srdjan Capkun, Chih-Chieh Han, ...
107
Voted
PAM
2010
Springer
15 years 9 months ago
Web Timeouts and Their Implications
Abstract. Timeouts play a fundamental role in network protocols, controlling numerous aspects of host behavior at different layers of the protocol stack. Previous work has documen...
Zakaria Al-Qudah, Michael Rabinovich, Mark Allman