Sciweavers

8377 search results - page 18 / 1676
» Scenarios - Introduction
Sort
View
VTC
2007
IEEE
115views Communications» more  VTC 2007»
15 years 6 months ago
The DYMO Routing Protocol in VANET Scenarios
—Coupling Vehicular Ad Hoc Networks (VANETs) with wired networks such as the Internet via access points creates a difficult mix of highly mobile nodes and a static infrastructur...
Christoph Sommer, Falko Dressler
ECTEL
2007
Springer
15 years 6 months ago
Modelling the Virtual Company Educational Scenario Competence Assessment in the Cooper Environment
The Virtual Company educational scenario engages students in a professional setting for working and learning. Students are enabled to develop competencies that are derived from pro...
Howard Spoelstra, Vlad Posea, Jan van Bruggen, Rob...
APN
2005
Springer
15 years 5 months ago
Can I Execute My Scenario in Your Net?
This paper describes the verification module (the VipVerify Module) of the VipTool [4]. VipVerify allows to verify whether a given scenario is an execution of a system model, give...
Gabriel Juhás, Robert Lorenz, Jörg Des...
ACSAC
2004
IEEE
15 years 3 months ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
APN
2006
Springer
15 years 3 months ago
Can I Execute My Scenario in Your Net? VipTool Tells You!
This paper describes the verification module (the VipVerify Module) of the VipTool [4]. VipVerify allows to verify whether a given scenario is an execution of a system model, given...
Robin Bergenthum, Jörg Desel, Gabriel Juh&aac...