Sciweavers

2503 search results - page 176 / 501
» Building Computer Network Attacks
Sort
View
110
Voted
LCN
2002
IEEE
15 years 6 months ago
Controlled Multicast Framework
The IP multicast has not been widely used by current internet service operators, and part of this relates to the nature of multicast, which is designed to allow any host to receiv...
Rami Lehtonen, Jarmo Harju
ICISC
2009
138views Cryptology» more  ICISC 2009»
14 years 11 months ago
Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson
At CANS 2008, Mashatan and Stinson suggested a message recognition protocol for ad hoc pervasive networks. The protocol provides a procedure to resynchronize in case of a (possibly...
Madeline González Muñiz, Rainer Stei...
EWSN
2010
Springer
15 years 11 months ago
TARF: A Trust-Aware Routing Framework for Wireless Sensor Networks
Multi-hop routing in wireless sensor networks (WSNs) offers little protection against deception through replaying routing information. This defect can be taken advantage of by an a...
Guoxing Zhan, Weisong Shi, Julia Deng
JCP
2007
132views more  JCP 2007»
15 years 1 months ago
A Theoretical Framework for Organizational Network Forensic Readiness
This paper discusses breaking the escalation cycle that locks cyber intruders and their targets in a state where targets are perennially resigned to attacks and intruders are at...
Barbara Endicott-Popovsky, Deborah A. Frincke, Car...
101
Voted
IJKDB
2010
162views more  IJKDB 2010»
14 years 11 months ago
New Trends in Graph Mining: Structural and Node-Colored Network Motifs
Searching for repeated features characterizing biological data is fundamental in computational biology. When biological networks are under analysis, the presence of repeated modul...
Francesco Bruno, Luigi Palopoli, Simona E. Rombo