A rogue insider, in a wireless network, is an authenticated member that exploits possession of a valid identity in order to launch an attack. A typical example is the transmission...
This paper presents a new interaction metaphor we have termed “god-like interaction”. This is a metaphor for improved communication of situational and navigational information...
Abstract. The Internet is facing ever-increasing complexity in the construction, configuration and management of heterogeneous networks. New communication paradigms are underminin...
Xiaoyuan Gu, Xiaoming Fu, Hannes Tschofenig, Lars ...
We study the amount of knowledge about the network that is required in order to efficiently solve a task concerning this network. The impact of available information on the effici...
Dense, unmanaged 802.11 deployments tempt saboteurs into launching jamming attacks by injecting malicious interference. Nowadays, jammers can be portable devices that transmit int...
Konstantinos Pelechrinis, Ioannis Broustis, Srikan...