Sciweavers

7544 search results - page 196 / 1509
» Network Forensics Analysis
Sort
View
GLOBECOM
2006
IEEE
15 years 9 months ago
Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure
— The wormhole attack is one of the most severe security attacks in wireless ad hoc networks. In this paper, we analyze the effect of the wormhole attack in shortest path routing...
Majid Khabbazian, Hugues Mercier, Vijay K. Bhargav...
127
Voted
IFIP
2003
Springer
15 years 9 months ago
Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks - The Static Case
In multi-hop wireless networks, every node is expected to forward packets for the benefit of other nodes. Yet, if each node is its own authority, then it may selfishly deny packe...
Márk Félegyházi, Levente Butt...
SIGMETRICS
1987
ACM
102views Hardware» more  SIGMETRICS 1987»
15 years 7 months ago
Delay Analysis of a Window Tree Conflict Resolution Algorithm in a Local Area Network Environment
Expressions are found for the throughput and delay performance of a Tree Conflict Resolution Algorithm that is used in a Local Area Network with carrier sensing (and possibly also ...
George C. Polyzos, Mart Molle
135
Voted
SIGCOMM
2010
ACM
15 years 3 months ago
Automating root-cause analysis of network anomalies using frequent itemset mining
Finding the root-cause of a network security anomaly is essential for network operators. In our recent work [1, 5], we introduced a generic technique that uses frequent itemset mi...
Ignasi Paredes-Oliva, Xenofontas A. Dimitropoulos,...
122
Voted
ICASSP
2010
IEEE
15 years 3 months ago
Stochastic cross-layer resource allocation for wireless networks using orthogonal access: Optimality and delay analysis
Efficient design of wireless networks requires implementation of cross-layer algorithms that exploit channel state information. Capitalizing on convex optimization and stochastic...
Antonio G. Marqués, Georgios B. Giannakis, ...