Sciweavers

234 search results - page 6 / 47
» Text Search Protocols with Simulation Based Security
Sort
View
IEEEARES
2009
IEEE
15 years 4 months ago
A Mobile Ambients-Based Approach for Network Attack Modelling and Simulation
Abstract—Attack Graphs are an important support for assessment and subsequent improvement of network security. They reveal possible paths an attacker can take to break through se...
Virginia N. L. Franqueira, Pascal van Eck, Roel Wi...
RAID
2010
Springer
14 years 8 months ago
Inferring Protocol State Machine from Real-World Trace
Application-level protocol specifications are helpful for network security management, including intrusion detection, intrusion prevention and detecting malicious code. However, c...
Yipeng Wang, Zhibin Zhang, Li Guo
MUE
2008
IEEE
218views Multimedia» more  MUE 2008»
15 years 4 months ago
I-SEAD: A Secure Routing Protocol for Mobile Ad Hoc Networks
Ad hoc networks are highly dynamic routing networks cooperated by a collection of wireless mobile hosts without any assistance of centralized access point. Secure Efficient Ad hoc...
Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Ch...
ACL
2010
14 years 7 months ago
Using Speech to Reply to SMS Messages While Driving: An In-Car Simulator User Study
Speech recognition affords automobile drivers a hands-free, eyes-free method of replying to Short Message Service (SMS) text messages. Although a voice search approach based on te...
Yun-Cheng Ju, Tim Paek
CCS
2008
ACM
14 years 11 months ago
SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks
Multi-hop routing is essential to the operation of wireless ad hoc networks. Unfortunately, it is very easy for an adversary to forge or modify routing messages to inflict severe ...
Qing Li, Yih-Chun Hu, Meiyuan Zhao, Adrian Perrig,...