Sciweavers

642 search results - page 97 / 129
» Detecting Spoofed Packets
Sort
View
ANCS
2009
ACM
15 years 2 months ago
A NFA-based programmable regular expression match engine
Pattern matching is the most computation intensive task of a network intrusion detection system (NIDS). In this paper we present a hardware architecture to speed up the pattern mat...
Derek Pao
IFIP
2009
Springer
15 years 2 months ago
Consistency Analysis of Network Traffic Repositories
Traffic repositories with TCP/IP header information are very important for network analysis. Researchers often assume that such repositories reliably represent all traffic that has...
Elmer Lastdrager, Aiko Pras
192
Voted
EJWCN
2010
237views more  EJWCN 2010»
14 years 11 months ago
A Secure Localization Approach against Wormhole Attacks Using Distance Consistency
Abstract--Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sn...
Honglong Chen, Wei Lou, Xice Sun, Zhi Wang
IJSNET
2011
55views more  IJSNET 2011»
14 years 8 months ago
Testing network protocols and signal attenuation in packed food transports
: Two sensor network protocols for the monitoring of packed food products were tested in different sea containers. The packet rate and the signal strength of all sensor-to-sensor l...
Reiner Jedermann, Markus Becker, Carmelita Gö...
152
Voted
INFOCOM
2009
IEEE
15 years 11 months ago
PHY Aided MAC - A New Paradigm
—Network protocols have traditionally been designed using a layered method in part because it is easier to implement some portions of network protocols in software and other port...
Dola Saha, Aveek Dutta, Dirk Grunwald, Douglas C. ...