Sciweavers

1807 search results - page 248 / 362
» Resilient Overlay Networks
Sort
View
CRISIS
2008
14 years 11 months ago
An ontology-based approach to react to network attacks
To address the evolution of security incidents in current communication networks it is important to react quickly and efficiently to an attack. The RED (Reaction after Detection) ...
Nora Cuppens-Boulahia, Frédéric Cupp...
ADHOC
2007
130views more  ADHOC 2007»
14 years 10 months ago
Implementation of security policy for clinical information systems over wireless sensor networks
Various healthcare areas such as diagnosis, surgery, intensive care and treatment, and patient monitoring in general, would greatly benefit from light, autonomous devices which c...
Jelena V. Misic, Vojislav B. Misic
JNSM
2008
73views more  JNSM 2008»
14 years 10 months ago
Probe Station Placement for Robust Monitoring of Networks
1 In this paper we address the problem of selecting probe station locations from where probes can be sent to monitor all the nodes in the network. Probe station placement involves...
Maitreya Natu, Adarshpal S. Sethi
MDM
2009
Springer
126views Communications» more  MDM 2009»
15 years 4 months ago
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory
Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have bee...
Wenjia Li, Anupam Joshi
WCNC
2008
IEEE
15 years 4 months ago
Link-Diversity Routing: A Robust Routing Paradigm for Mobile Ad Hoc Networks
—We present link-diversity routing, a routing paradigm that achieves high path resilience in mobile ad hoc networks. Link-diversity routing chooses each hop of a packet’s route...
Vincent Lenders, Rainer Baumann