Sciweavers

188 search results - page 18 / 38
» Simulative Evaluation of Security Attacks in Networked Criti...
Sort
View
ICC
2009
IEEE
153views Communications» more  ICC 2009»
15 years 5 months ago
Detecting Malicious Packet Dropping in the Presence of Collisions and Channel Errors in Wireless Ad Hoc Networks
—Detecting malicious packet dropping is important in ad hoc networks to combat a variety of security attacks such as blackhole, greyhole, and wormhole attacks. We consider the de...
Thaier Hayajneh, Prashant Krishnamurthy, David Tip...
INFOCOM
2007
IEEE
15 years 5 months ago
On the Detection of Signaling DoS Attacks on 3G Wireless Networks
— Third Generation (3G) wireless networks based on the CDMA2000 and UMTS standards are now increasingly being deployed throughout the world. Because of their complex signaling an...
Patrick P. C. Lee, Tian Bu, Thomas Y. C. Woo
ISF
2008
114views more  ISF 2008»
14 years 10 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
MDM
2010
Springer
189views Communications» more  MDM 2010»
15 years 3 months ago
On the Evaluation of Caching in Vehicular Information Systems
—VANETs have been envisioned as an infrastructure for deploying Vehicular Information Systems (VIS) that among others provide drivers with an up-to-date view on the prevailing tr...
Nicholas Loulloudes, George Pallis, Marios D. Dika...
CNSR
2005
IEEE
100views Communications» more  CNSR 2005»
15 years 19 days ago
Malicious Behaviour in Content-Addressable Peer-to-Peer Networks
Distributed Hash Tables (DHTs) promise to manage huge sets of key-value pairs in a Peer-to-Peer manner. The Content-Addressable Network (CAN) is a prominent variant of DHT. A crit...
Thomas Reidemeister, Klemens Böhm, Paul A. S....