Sciweavers

2503 search results - page 47 / 501
» Building Computer Network Attacks
Sort
View
CONEXT
2006
ACM
15 years 11 months ago
Virtual networks under attack: disrupting internet coordinate systems
Internet coordinate-based systems are poised to become an important service to support overlay construction and topology-aware applications. Indeed, through network distance embed...
Mohamed Ali Kâafar, Laurent Mathy, Thierry T...
INFOCOM
2007
IEEE
15 years 11 months ago
Attack Detection in Wireless Localization
— Accurately positioning nodes in wireless and sensor networks is important because the location of sensors is a critical input to many higher-level networking tasks. However, th...
Yingying Chen, Wade Trappe, Richard P. Martin
IPPS
2003
IEEE
15 years 10 months ago
A Generic Scheme for Building Overlay Networks in Adversarial Scenarios
This paper presents a generic scheme for a central, yet untackled issue in overlay dynamic networks: maintaining stability over long life and against malicious adversaries. The ge...
Ittai Abraham, Baruch Awerbuch, Yossi Azar, Yair B...
CLUSTER
2007
IEEE
15 years 11 months ago
Building the communication performance model of heterogeneous clusters based on a switched network
— Analytical communication performance models play an important role in prediction of the execution time of parallel applications on multiprocessors. Apart from designing such a ...
Alexey L. Lastovetsky, Vladimir Rychkov
130
Voted
CNSR
2006
IEEE
15 years 11 months ago
Trusted Computing for Protecting Ad-hoc Routing
Ad-hoc networks rely on participation and cooperation of nodes within the network to transmit data to destinations. However, in networks where participating nodes are controlled b...
Michael Jarrett, Paul Ward