Sciweavers

777 search results - page 102 / 156
» Secure broadcasting in large networks
Sort
View
GLOBECOM
2010
IEEE
14 years 7 months ago
Cross-Layer Attack and Defense in Cognitive Radio Networks
The existing research on security issues in cognitive radio networks mainly focuses on attack and defense in individual network layers. However, the attackers do not necessarily re...
Wenkai Wang, Yan Sun, Husheng Li, Zhu Han
IM
2007
14 years 9 months ago
Pursuit-Evasion in Models of Complex Networks
Vertex pursuit games, such as the game of Cops and Robbers, are a simplified model for network security. In these games, cops try to capture a robber loose on the vertices of the ...
Anthony Bonato, Pawel Pralat, Changping Wang
MOBIQUITOUS
2007
IEEE
15 years 4 months ago
Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks
— Vehicular ad hoc networks (VANETs) are being advocated for traffic control, accident avoidance, and a variety of other applications. Security is an important concern in VANETs...
Tong Zhou, Romit Roy Choudhury, Peng Ning, Krishne...
COMCOM
2007
156views more  COMCOM 2007»
14 years 9 months ago
A survey on clustering algorithms for wireless sensor networks
The past few years have witnessed increased interest in the potential use of wireless sensor networks (WSNs) in applications such as disaster management, combat field reconnaissa...
Ameer Ahmed Abbasi, Mohamed F. Younis
AINA
2006
IEEE
15 years 3 months ago
A Bulk-retrieval Technique for Effective Remote Monitoring in a Mobile Environment
For effective management it is necessary to have methods by which management applications can periodically retrieve large volumes of information from network devices. In this work...
Glenn Mansfield Keeni, Kazuhide Koide, Takeo Saito...