Sciweavers

1692 search results - page 323 / 339
» Evaluation of Security Mechanisms in Wireless Sensor Network...
Sort
View
CONEXT
2009
ACM
15 years 24 days ago
ARES: an anti-jamming reinforcement system for 802.11 networks
Dense, unmanaged 802.11 deployments tempt saboteurs into launching jamming attacks by injecting malicious interference. Nowadays, jammers can be portable devices that transmit int...
Konstantinos Pelechrinis, Ioannis Broustis, Srikan...
ICC
2007
IEEE
146views Communications» more  ICC 2007»
15 years 6 months ago
Correlation Based Rate Adaptation via Insights from Incomplete Observations in 802.11 Networks
—Rate adaptation, as a challenging issue for wireless purpose. Relatively little attention has been paid on identifying network design, has been an active research topic for year...
Xia Zhou, Jun Zhao, Guang-Hua Yang
GLOBECOM
2007
IEEE
14 years 12 months ago
Multi-Class QoS in 802.11 Networks Using Gentle Decrease of Multiple Contention Windows
—IEEE 802.11 Distributed Coordination Function (DCF) uses a binary exponential backoff algorithm to arbitrate simultaneous channel access by multiple stations. When a station sen...
Bushra Anjum, Zartash Afzal Uzmi
92
Voted
CCS
2004
ACM
15 years 5 months ago
Testing network-based intrusion detection signatures using mutant exploits
Misuse-based intrusion detection systems rely on models of attacks to identify the manifestation of intrusive behavior. Therefore, the ability of these systems to reliably detect ...
Giovanni Vigna, William K. Robertson, Davide Balza...
VTC
2007
IEEE
132views Communications» more  VTC 2007»
15 years 6 months ago
Collaborative Information Revelation and Collusion in "Word-of-Mouth" Access Selection Schemes
— “Word-of-Mouth”, a novel scheme for sharing the service quality experienced with different local networks, is presented and evaluated as a distributed solution for performi...
Pietro Lungaro