Sciweavers

4323 search results - page 15 / 865
» On the Security of 3GPP Networks
Sort
View
ASIASIM
2004
Springer
15 years 4 months ago
Simulating Cyber-intrusion Using Ordered UML Model-Based Scenarios
Abstract. Network security simulator is required for the study on the cyber intrusion and defense as cyber terrors have been increasingly popular. Until now, network security simul...
Eung Ki Park, Joo Beom Yun, Hoh Peter In
ICSNC
2006
IEEE
15 years 5 months ago
Security Issues in Wireless Sensor Networks
– Due to inherent limitations in wireless sensor networks, security is a crucial issue. While research in WSN security is progressing at tremendous pace, no comprehensive documen...
Tanveer Zia, Albert Y. Zomaya
AAAI
2012
13 years 1 months ago
Security Games for Controlling Contagion
Many strategic actions carry a ‘contagious’ component beyond the immediate locale of the effort itself. Viral marketing and peacekeeping operations have both been observed to ...
Jason Tsai, Thanh H. Nguyen, Milind Tambe