Sciweavers

642 search results - page 91 / 129
» Detecting Spoofed Packets
Sort
View
139
Voted
ITIIS
2010
131views more  ITIIS 2010»
15 years 3 months ago
The Analysis of Random Propagating Worms using Network Bandwidth
There is a well-defined propagation model, named the random constant spread (RCS) model, which explains worms that spread their clones with a random scanning strategy. This model ...
Kwangsun Ko, Hyun-Su Jang, Byuong Woon Park, Young...
WINET
2010
146views more  WINET 2010»
15 years 3 months ago
Allocating data for broadcasting over wireless channels subject to transmission errors
Broadcasting is an efficient and scalable way of transmitting data over wireless channels to an unlimited number of clients. In this paper the problem of allocating data to multip...
Paolo Barsocchi, Alan A. Bertossi, Maria Cristina ...
184
Voted
TWC
2010
14 years 11 months ago
Toward network coding-based protocols for data broadcasting in wireless Ad Hoc networks
In this paper we consider practical dissemination algorithms exploiting network coding for data broadcasting in ad hoc wireless networks. For an efcient design, we analyze issues r...
Alfred Asterjadhi, Elena Fasolo, Michele Rossi, J&...
142
Voted
VTC
2008
IEEE
196views Communications» more  VTC 2008»
15 years 11 months ago
Block Equalization and Generalized MLSE Arbitration for the HSPA WCDMA Uplink
Abstract— High Speed Packet Access (HSPA), the latest evolution of the Wideband Code Division Multiple Access (WCDMA) standard, provides higher uplink data rates using higher-ord...
Gregory E. Bottomley
SECURWARE
2007
IEEE
15 years 11 months ago
A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments
A Man-in-the-Middle (MitM) attack is, in the scope of a LAN, a technique where an attacker is able to redirect all traffic between two hosts of that same LAN for packet sniffing...
Jorge Belenguer, Carlos Miguel Tavares Calafate