Sciweavers

4998 search results - page 101 / 1000
» The case for intentional networking
Sort
View
IJWBC
2011
88views more  IJWBC 2011»
14 years 4 months ago
Personal profiles: enhancing social interaction in learning networks
Nowadays, we witness a surge of online profiling sites; in them people make their profile available to others with the intention to share it and get in touch with others, find old ...
Adriana J. Berlanga, Marlies Bitter-Rijpkema, Fran...
ICDCS
2011
IEEE
13 years 9 months ago
JR-SND: Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks
Abstract—Secure neighbor discovery is fundamental to mobile ad hoc networks (MANETs) deployed in hostile environments and refers to the process in which two neighboring nodes exc...
Rui Zhang 0007, Yanchao Zhang, Xiaoxia Huang
ACSAC
2004
IEEE
15 years 1 months ago
Attack Plan Recognition and Prediction Using Causal Networks
Correlating and analyzing security alerts is a critical and challenging task in security management. Recently, some techniques have been proposed for security alert correlation. H...
Xinzhou Qin, Wenke Lee
PST
2004
14 years 11 months ago
Syntax-based Vulnerability Testing of Frame-based Network Protocols
Syntax-based vulnerability testing is a static black-box testing method for protocol implementations. It involves testing the Implementation Under Test (IUT) with a large number o...
Oded Tal, Scott Knight, Tom Dean
FLAIRS
2007
15 years 6 days ago
Pattern-Constrained Test Case Generation
In this paper we present a novel approach for patternconstrained test case generation. The generation of test cases with known characteristics is usually a non-trivial task. In co...
Martin Atzmüller, Joachim Baumeister, Frank P...