Digital investigators have an increasing need to examine data network logs and traffic, either as part of criminal or civil investigations or when responding to information securi...
Smart devices in the ubiquitous computing environment implement service/device discovery protocol that helps discovering each other and the services provided. As client device may ...
Traditional attack detection schemes based on packets or flows have very high computational complexity. And, network based anomaly detection schemes can reduce the complexity, but...
AQM (Active Queue Management) mechanism is a congestion control mechanism at a router for controlling the number of packets in the router’s buffer by actively discarding an arri...
Abstract—In this paper, we study the problem of misbehavior detection in wireless networks . A commonly adopted approach is to utilize the broadcast nature of the wireless medium...