Sciweavers

1737 search results - page 80 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
CONCURRENCY
2010
104views more  CONCURRENCY 2010»
14 years 12 months ago
Performance analysis of an experimental wireless relay sensor network
Communication through relay channels in wireless sensor networks can create diversity and consequently improve robustness of data transmission for ubiquitous computing and network...
Gu-Chun Zhang, Xiao-Hong Peng, Xuan-Ye Gu
IFIP
2001
Springer
15 years 4 months ago
Security Documentation
Effective security management depends upon good risk management, which is itself based upon a reliable risk assessment, involving data collection of all the facets influencing sys...
Lam-for Kwok, Peggy P. K. Fung, Dennis Longley
IV
2010
IEEE
214views Visualization» more  IV 2010»
14 years 10 months ago
The Network Lens: Interactive Exploration of Multivariate Networks Using Visual Filtering
—Networks are widely used in modeling relational data often comprised of thousands of nodes and edges. This kind of data alone implies a challenge for its visualization as it is ...
Ilir Jusufi, Yang Dingjie, Andreas Kerren
WEA
2005
Springer
109views Algorithms» more  WEA 2005»
15 years 5 months ago
Synchronization Fault Cryptanalysis for Breaking A5/1
Abstract. A5/1 pseudo-random bit generator, known from GSM networks, potentially might be used for different purposes, such as secret hiding during cryptographic hardware testing, ...
Marcin Gomulkiewicz, Miroslaw Kutylowski, Heinrich...
GLOBECOM
2009
IEEE
15 years 3 months ago
A Game Theoretic Analysis of Blacklisting in Online Data Storage Systems
Abstract—In this paper, we investigate the problem of online data sharing on social networks from a game theoretic framework. We introduce blacklisting as trigger strategy to eli...
Bader Ali, Muthucumaru Maheswaran