Sciweavers

2503 search results - page 47 / 501
» Building Computer Network Attacks
Sort
View
CONEXT
2006
ACM
15 years 3 months ago
Virtual networks under attack: disrupting internet coordinate systems
Internet coordinate-based systems are poised to become an important service to support overlay construction and topology-aware applications. Indeed, through network distance embed...
Mohamed Ali Kâafar, Laurent Mathy, Thierry T...
INFOCOM
2007
IEEE
15 years 4 months ago
Attack Detection in Wireless Localization
— Accurately positioning nodes in wireless and sensor networks is important because the location of sensors is a critical input to many higher-level networking tasks. However, th...
Yingying Chen, Wade Trappe, Richard P. Martin
IPPS
2003
IEEE
15 years 3 months ago
A Generic Scheme for Building Overlay Networks in Adversarial Scenarios
This paper presents a generic scheme for a central, yet untackled issue in overlay dynamic networks: maintaining stability over long life and against malicious adversaries. The ge...
Ittai Abraham, Baruch Awerbuch, Yossi Azar, Yair B...
CLUSTER
2007
IEEE
15 years 4 months ago
Building the communication performance model of heterogeneous clusters based on a switched network
— Analytical communication performance models play an important role in prediction of the execution time of parallel applications on multiprocessors. Apart from designing such a ...
Alexey L. Lastovetsky, Vladimir Rychkov
CNSR
2006
IEEE
15 years 3 months ago
Trusted Computing for Protecting Ad-hoc Routing
Ad-hoc networks rely on participation and cooperation of nodes within the network to transmit data to destinations. However, in networks where participating nodes are controlled b...
Michael Jarrett, Paul Ward