Sciweavers

450 search results - page 64 / 90
» Network intrusion investigation - Preparation and challenges
Sort
View
ICASSP
2011
IEEE
14 years 1 months ago
Vulnerability of insens to denial of service attacks
Wireless Sensor Networks (WSNs) may be deployed in hostile or inaccessible environments and are often unattended. In these conditions securing a WSN against malicious attacks is a...
Kashif Saghar, David Kendall, Ahmed Bouridane
ADHOC
2005
176views more  ADHOC 2005»
14 years 9 months ago
A survey of Mobile IP in cellular and Mobile Ad-Hoc Network environments
The Internet has become ubiquitous and there has been tremendous growth in wireless communications in recent years. Many wireless communication techniques are commercially availab...
Tin Yu Wu, Ching-Yang Huang, Han-Chieh Chao
WORDS
2005
IEEE
15 years 3 months ago
Virtual Networks in an Integrated Time-Triggered Architecture
Depending on the physical structuring of large distributed safety-critical real-time systems, one can distinguish federated and integrated system architectures. This paper investi...
Roman Obermaisser, Philipp Peti, Hermann Kopetz
ENTCS
2006
145views more  ENTCS 2006»
14 years 9 months ago
A Calculus for Data Mapping
Technologies for overcoming heterogeneities between autonomous data sources are key in the emerging networked world. In this paper we discuss the initial results of a formal inves...
George H. L. Fletcher, Catharine M. Wyss, Edward L...
ICCCN
2007
IEEE
15 years 4 months ago
An FEC-based Reliable Data Transport Protocol for Underwater Sensor Networks
—In this paper, we investigate the reliable data transport problem in underwater sensor networks. Underwater sensor networks are significantly different from terrestrial sensor ...
Peng Xie, Jun-Hong Cui