Sciweavers

1718 search results - page 267 / 344
» Simulating Network Robustness for Critical Infrastructure Ne...
Sort
View
COMCOM
2004
153views more  COMCOM 2004»
14 years 9 months ago
BLR: beacon-less routing algorithm for mobile ad hoc networks
Routing of packets in mobile ad hoc networks with a large number of nodes or with high mobility is a very difficult task and current routing protocols do not really scale well wit...
Marc Heissenbüttel, Torsten Braun, Thomas Ber...
SECON
2010
IEEE
14 years 7 months ago
SAND: Sectored-Antenna Neighbor Discovery Protocol for Wireless Networks
Abstract--Directional antennas offer many potential advantages for wireless networks such as increased network capacity, extended transmission range and reduced energy consumption....
Emad Felemban, Robert Murawski, Eylem Ekici, Sangj...
WEBI
2009
Springer
15 years 4 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
ISM
2008
IEEE
98views Multimedia» more  ISM 2008»
15 years 4 months ago
Protecting SIP Proxy Servers from Ringing-Based Denial-of-Service Attacks
As Internet telephony systems continue to replace existing Public Switched Telephone Network systems, proxy servers running the Session Initiation Protocol (SIP) will continue to ...
William Conner, Klara Nahrstedt
GLOBECOM
2007
IEEE
15 years 4 months ago
Service Oriented Architecture (SOA) for Integration of Field Bus Systems
—The current trends in service consolidation over Internet Protocol (IP) also stimulates the integration of the industrial automation system with the information technology (IT) ...
Xiaohua Tian, Yu Cheng, Rose Qingyang Hu, Yi Qian