So far we have developed a disaster information network which is very effective and robust using wireless network. In this paper, we introduce a mobile network for disaster commun...
We implemented an attack against WEP, the link-layer security protocol for 802.11 networks. The attack was described in a recent paper by Fluhrer, Mantin, and Shamir. With our imp...
Network emulation systems are widely used to explore the behavior of network protocols and to test and evaluate protocol implementations and applications. The major problem of net...
The lack of automation associated with network operations in general and network configuration management in particular, is widely recognized as a significant contributing factor ...
Xu Chen, Zhuoqing Morley Mao, Jacobus E. van der M...
Abstract. Network robustness is something all providers are striving for without being able to know all the aspects it encompasses. A key aspect of network robustness concerns its ...