Sciweavers

87 search results - page 18 / 18
» On the Completeness of Attack Mutation Algorithms
Sort
View
CORR
2010
Springer
177views Education» more  CORR 2010»
14 years 10 months ago
AntiJam: Efficient Medium Access despite Adaptive and Reactive Jamming
Abstract--Intentional interference constitutes a major threat for communication networks operating over a shared medium where availability is imperative. Jamming attacks are often ...
Andréa W. Richa, Christian Scheideler, Stef...
MOBIHOC
2005
ACM
16 years 22 days ago
Toward resilient security in wireless sensor networks
Node compromise poses severe security threats in wireless sensor networks. Unfortunately, existing security designs can address only a small, fixed threshold number of compromised...
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William A....