General-purpose operating systems provide a rich computing environment both to the user and the attacker. The declining cost of hardware and the growing security concerns of softw...
Eric Bryant, James P. Early, Rajeev Gopalakrishna,...
Many networking researches depend on an accurate simulation of network traffic. For example, Intrusion Detection Systems generally require tuning to be effective in each new envir...
Abstract. Much of the data consumed today is dynamic, typically gathered from distributed sources including sensors, and used in real-time monitoring and decision making applicatio...
Having access to an accurate time is a vital building block in all networks; in wireless sensor networks even more so, because wireless media access or data fusion may depend on i...
Christoph Lenzen, Philipp Sommer, Roger Wattenhofe...
In this paper we present a data dissemination protocol for efficiently distributing data through a sensor network in the face of node and link failures. Our work is motivated by t...