Sciweavers

1718 search results - page 101 / 344
» Simulating Network Robustness for Critical Infrastructure Ne...
Sort
View
FCCM
2005
IEEE
102views VLSI» more  FCCM 2005»
15 years 3 months ago
A Signature Match Processor Architecture for Network Intrusion Detection
In this paper, we introduce a novel architecture for a hardware based network intrusion detection system (NIDS). NIDSs are becoming critical components of the network infrastructu...
Janardhan Singaraju, Long Bu, John A. Chandy
MOBIHOC
2007
ACM
15 years 9 months ago
Surviving attacks on disruption-tolerant networks without authentication
Disruption-Tolerant Networks (DTNs) deliver data in network environments composed of intermittently connected nodes. Just as in traditional networks, malicious nodes within a DTN ...
John Burgess, George Dean Bissias, Mark D. Corner,...
JSAC
2010
172views more  JSAC 2010»
14 years 8 months ago
Cross-layer QoS-aware communication for ultra wide band wireless multimedia sensor networks
—Wireless Multimedia Sensor Networks (WMSNs) are distributed systems of wirelessly networked devices that allow retrieving video and audio streams, still images, and scalar senso...
Tommaso Melodia, Ian F. Akyildiz
IJAHUC
2011
143views more  IJAHUC 2011»
14 years 1 months ago
A mobility framework to improve heterogeneous wireless network services
: We propose and investigate the Internet Protocol version 6 (IPv6) enabled mobility framework to improve the user mobility experience in heterogenous wireless networks. The framew...
Chong Shen, Wencai Du, Robert Atkinson, James Irvi...
INTERSENSE
2006
ACM
15 years 3 months ago
Particle-based methodology for representing mobile ad-hoc networks
—We present a methodology based on physics laws and particles in order to represent, simulate, and architect advanced networking models. We introduce a mathematical formalism wit...
Carlos J. Martinez, Marisa López, Luis C. E...