Sciweavers

20813 search results - page 529 / 4163
» Introduction to Computer Networking
Sort
View
IWNAS
2008
IEEE
15 years 11 months ago
Event-based Trust Framework Model in Wireless Sensor Networks
The security of wireless sensor networks is ever more important nowadays. Most of the proposed security protocols in wireless sensor networks are based on authentication and encry...
Haiguang Chen, Huafeng Wu, Jinchu Hu, Chuanshan Ga...
BROADNETS
2007
IEEE
15 years 11 months ago
MIST: Cellular data network measurement for mobile applications
— The rapid growth in the popularity of cellular networks has led to aggressive deployment and a rapid expansion of services. Services based on the integration of these networks ...
Mike P. Wittie, Brett Stone-Gross, Kevin C. Almero...
NDSS
2007
IEEE
15 years 11 months ago
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces
Encouraging the release of network data is central to promoting sound network research practices, though the publication of this data can leak sensitive information about the publ...
Scott E. Coull, Charles V. Wright, Fabian Monrose,...
AINTEC
2007
Springer
15 years 11 months ago
A Real-Time Performance-Monitoring Tool for Emergency Networks
Abstract. Emergency networks normally operate under highly unpredictable wireless environment and hence real time performance information holds a great significance that cannot be...
Shuprabha Shakya, Mohammad Abdul Awal, Dwijendra K...
160
Voted
ICDCSW
2005
IEEE
15 years 10 months ago
A Topologically-Aware Worm Propagation Model for Wireless Sensor Networks
Internet worms have repeatedly revealed the susceptibility of network hosts to malicious intrusions. Recent studies have proposed to employ the underlying principles of worm propa...
Syed A. Khayam, Hayder Radha