A widely used approach to avoid network intrusion is SNORT, an open source Network Intrusion Detection System (NIDS). This work describes SPP-NIDS, a architecture for intrusion de...
Luis Carlos Caruso, Guilherme Guindani, Hugo Schmi...
Mobile Ad hoc Networks (MANETs) rely on dynamic configuration decisions to efficiently operate in a rapidly changing environment of limited resources. The ability of a MANET to ma...
Mark E. Orwat, Timothy E. Levin, Cynthia E. Irvine
— This paper presents a new cross-layer approach to achieve active link adaptation and QoS support in ad hoc networks. Upon data reception in a transmission slot, receivers broad...
Alexander Tyrrell, Harald Haas, Gunther Auer, Pete...
Abstract—This paper presents a fully decentralized link adaptation algorithm to manage interference in an ad hoc network operating in TDD mode. The algorithm, called busy tone in...
Patrick Agyapong, Harald Haas, Alexander Tyrrell, ...
Mobile computing systems provide new challenges for verification. One of them is the dynamicity of the system structure, with mobility-induced connections and disconnections, dynam...