• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 42,959
Next 10 →

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

by Chris Karlof, David Wagner - , 2003
"... We consider routing security in wireless sensor networks. Many sensor network routing protocols have been proposed, but none of them have been designed with security as agq1( We propose securitygcur forrouting in sensor networks, show how attacks agacks ad-hoc and peer-to-peer networks can be ..."
Abstract - Cited by 789 (3 self) - Add to MetaCart
We consider routing security in wireless sensor networks. Many sensor network routing protocols have been proposed, but none of them have been designed with security as agq1( We propose securitygcur forrouting in sensor networks, show how attacks agacks ad-hoc and peer-to-peer networks can

Attack patterns in VoIP

by Juan C. Pelaez, Eduardo B. Fern, Maria M. Larrondo-petrie - Procs. of the 14th Pattern Languages of Programs Conference (PLoP2007
"... In VoIP, in order to avoid attacks and discover security vulnerabilities, it is necessary to be aware of typical risks and to have a good understanding of how vulnerabilities can be exploited. In a previous paper we presented the concept of attack patterns. Attack patterns describe from the point of ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
In VoIP, in order to avoid attacks and discover security vulnerabilities, it is necessary to be aware of typical risks and to have a good understanding of how vulnerabilities can be exploited. In a previous paper we presented the concept of attack patterns. Attack patterns describe from the point

VoIP in the Context of Security

by Fiifi Botwe Arkaah , 2006
"... The wide spread deployment of enterprise networks and its capacity to carry voice traffic over the internet has spear-headed the march forward for IP-telephony or voice over internet protocol (VoIP). Unfortunately, the internet which is based on IPv4 public networks was not built to anticipate the ..."
Abstract - Add to MetaCart
the security problems that could be passed on to this evolving technology. Moreover, VoIP has been challenged to provide better quality of service (QoS) in addition to its much hyped or promised value added services. A much better way to mitigate these IPv4 network security issues is to adopt a defence

Ariadne: A secure on-demand routing protocol for ad hoc networks

by Yih-chun Hu , 2002
"... An ad hoc network is a group of wireless mobile computers (or nodes), in which individual nodes cooperate by forwarding packets for each other to allow nodes to communicate beyond direct wireless transmission range. Prior research in ad hoc networking has generally studied the routing problem in a n ..."
Abstract - Cited by 900 (11 self) - Add to MetaCart
non-adversarial setting, assuming a trusted environment. In this paper, we present attacks against routing in ad hoc networks, and we present the design and performance evaluation of a new secure on-demand ad hoc network routing protocol, called Ariadne. Ariadne prevents attackers or compromised nodes

VoIP Security Vulnerabilities

by David Persky , 2007
"... This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission.

VoIP Security

by Brian Caswell, Snort Intrusion, Angela Orebaugh, Gilbert Ramirez’s Ethereal, Thomas Porter, Andy Zmolek, Antonio Rosela, Michael Cross, Larry Chaffin, Brian Baskin
"... Packet Sniffing. One of the reasons for the success of these books has ..."
Abstract - Add to MetaCart
Packet Sniffing. One of the reasons for the success of these books has

Misuse Patterns in VoIP

by Juan C. Pelaez, Eduardo B. Fernandez, M. M. Larrondo-petrie, Christian Wieser
"... In VoIP, in order to avoid attacks and discover security vulnerabilities, it is necessary to be aware of typical risks and to have a good understanding of how vulnerabilities can be exploited. In a previous paper we presented the concept of misuse patterns. Attack patterns describe from the point of ..."
Abstract - Add to MetaCart
In VoIP, in order to avoid attacks and discover security vulnerabilities, it is necessary to be aware of typical risks and to have a good understanding of how vulnerabilities can be exploited. In a previous paper we presented the concept of misuse patterns. Attack patterns describe from the point

CORE: A Collaborative Reputation mechanism to enforce node cooperation

by Pietro Michiardi, Refik Molva - in Mobile Ad Hoc Networks. Communication and Multimedia Security , 2002
"... hoc Networks. ..."
Abstract - Cited by 489 (11 self) - Add to MetaCart
hoc Networks.

Tapestry: A Resilient Global-scale Overlay for Service Deployment

by Ben Y. Zhao, Ling Huang, Jeremy Stribling, Sean C. Rhea, Anthony D. Joseph, John D. Kubiatowicz - IEEE Journal on Selected Areas in Communications , 2004
"... We present Tapestry, a peer-to-peer overlay routing infrastructure offering efficient, scalable, locationindependent routing of messages directly to nearby copies of an object or service using only localized resources. Tapestry supports a generic Decentralized Object Location and Routing (DOLR) API ..."
Abstract - Cited by 593 (14 self) - Add to MetaCart
We present Tapestry, a peer-to-peer overlay routing infrastructure offering efficient, scalable, locationindependent routing of messages directly to nearby copies of an object or service using only localized resources. Tapestry supports a generic Decentralized Object Location and Routing (DOLR) API

Cognitive Radio: Brain-Empowered Wireless Communications

by Simon Haykin , 2005
"... Cognitive radio is viewed as a novel approach for improving the utilization of a precious natural resource: the radio electromagnetic spectrum. The cognitive radio, built on a software-defined radio, is defined as an intelligent wireless communication system that is aware of its environment and use ..."
Abstract - Cited by 1479 (4 self) - Add to MetaCart
Cognitive radio is viewed as a novel approach for improving the utilization of a precious natural resource: the radio electromagnetic spectrum. The cognitive radio, built on a software-defined radio, is defined as an intelligent wireless communication system that is aware of its environment
Next 10 →
Results 1 - 10 of 42,959
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University