Networking & Network Security
1
|
Secure Data Aggregation in Wireless Sensor
Networks
|
2
|
Risk-Aware Mitigation for MANET Routing
Attacks
|
3
|
Packet-Hiding Methods for Preventing
Selective Jamming Attacks
|
4
|
Improve Efficiency and Reliability in Single
hop WSNs with Transmit-Only Nodes
|
5
|
ESM: Efficient and Scalable Data Center
Multicast Routing
|
6
|
An Efficient Method for
Attack RSA Scheme
|
7
|
Fast Detection of Mobile Replica Node Attacks
in Wireless Sensor Networks
Using Sequential Hypothesis
Testing
|
8
|
Scalable and Cost-Effective Interconnection
of Data-Center Servers Using Dual Server Ports
|
9
|
Detecting Spam Zombies by Monitoring Outgoing
Message
|
10
|
Dynamic Security Risk Management Using Bayesian
Attack Graphs
|
11
|
Enhanced Privacy ID: A Direct Anonymous
Attestation Scheme
with Enhanced Revocation Capabilities
|
12
|
Secured Trust: A Dynamic Trust Computation
Model for Secured Communication in Multi agent Systems
|
13
|
Abnormally Malicious Autonomous Systems and
Their Internet Connectivity
|
14
|
Zone Trust: Fast Zone-Based Node Compromise
Detection and Revocation in Wireless Sensor Networks Using Sequential
Hypothesis Testing
|
15
|
Privacy
Vulnerability of Published Anonymous Mobility Traces
|
16
|
A Cross-Domain Privacy-Preserving Protocol
for Cooperative Firewall Optimization
|
17
|
On the Discovery of Critical Links and Nodes
for Assessing Network Vulnerability
|
18
|
Defenses against
large scale online password guessing attacks by using
Persuasive click
points
|
19
|
Security schemes for wireless sensor
networks With mobile sink
|
20
|
Redundancy Management of Multipath Routing
for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks
|
21
|
Network intrusion detection System on
wireless mobile adhoc Networks
|
22
|
DSS: Distributed SINR-Based Scheduling
Algorithm for Multihop Wireless Networks
|
23
|
Routing Protocol
Based on Grover’s Searching Algorithm for Mobile Ad-hoc Networks
|
24
|
A New Progressive Algorithm for a Multiple
Longest Common Subsequences Problem and Its Efficient Parallelization
|
25
|
A Privacy Leakage Upper Bound
Constraint-Based Approach for
Cost-Effective Privacy Preserving of
Intermediate Data Sets in Cloud
|
26
|
Evaluating Implementation Strategies for
Location-Based Multicast Addressing
|
27
|
Self-Adaptive Contention Aware Routing
Protocol for Intermittently Connected Mobile Networks
|
28
|
Topological Conditions for In-Network
Stabilization of Dynamical Systems
|
29
|
Lightweight Sybil Attack Detection in MANETs
|
30
|
DSS: Distributed SINR-Based
Scheduling Algorithm for Multihop Wireless Networks
|
31
|
Randomized Information
Dissemination in Dynamic Environments
|
32
|
Scalable Routing Modeling
for Wireless Ad Hoc Networks by Using Polychromatic Sets
|
33
|
Self-Adaptive Contention
Aware Routing Protocol for Intermittently Connected Mobile Networks
|
34
|
Failure-Aware
Cascaded Suppression
in Wireless
Sensor Networks
|
35
|
Diffusion
Dynamics of Network Technologies With
Bounded
Rational Users: Aspiration-Based Learning
|
36
|
A Rank
Correlation Based Detection against
Distributed
Reflection DoS Attacks
|
No comments:
Post a Comment