Sciweavers

1123 search results - page 44 / 225
» Network Protocol System Fingerprinting - A Formal Approach
Sort
View
HICSS
2003
IEEE
108views Biometrics» more  HICSS 2003»
15 years 9 months ago
Border Node Retransmission Based Probabilistic Broadcast Protocols in Ad-Hoc Networks
In this paper, we propose some improvements to the flooding protocols that aim to efficiently broadcast a given information through the whole ad-hoc network. These improvements ...
Julien Cartigny, David Simplot
WOWMOM
2005
ACM
201views Multimedia» more  WOWMOM 2005»
15 years 9 months ago
Real-Time Intrusion Detection for Ad Hoc Networks
A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols de...
Ioanna Stamouli, Patroklos G. Argyroudis, Hitesh T...
CADE
2011
Springer
14 years 4 months ago
Deciding Security for Protocols with Recursive Tests
Abstract. Security protocols aim at securing communications over public networks. Their design is notoriously difficult and error-prone. Formal methods have shown their usefulness ...
Mathilde Arnaud, Véronique Cortier, St&eacu...
SFM
2004
Springer
15 years 9 months ago
Embedded Software Analysis with MOTOR
This paper surveys the language Modest, a Modelling and Description language for Stochastic and Timed systems, and its accompanying tool-environment MOTOR. The language and tool ar...
Joost-Pieter Katoen, Henrik C. Bohnenkamp, Ric Kla...
WETICE
1998
IEEE
15 years 8 months ago
A Deontic Formalism for Co-ordinating Software Development in Virtual Software Corporations
The concept of the Virtual Software Corporation (VSC) has recently become a practical reality as a result of advances in communication and distributed technologies. However, there...
Zsolt Haag, Richard Foley, Julian Newman