Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Mobility Management Approaches for Mobile IP Networks: Performance Comparison and Use
Recommendations.
2.Multipath Dissemination in Regular Mesh Topologies.
3.Continuous Monitoring of Spatial Queries in Wireless Broadcast Environments.
4.Detecting Malicious Packet Losses.
5.Dynamic Routing with Security Considerations.
6.Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing.
7.Mitigation of Control Channel Jamming under Node Capture Attacks.
8.Security Analysis of the SASI(strong authentication and strong integrity) Protocol.
9.Energy-Efficient SINR-Based Routing for Multi-hop Wireless Networks.
10.Mitigation of Control Channel Jamming under Node Capture Attacks.
11 .Dynamic Routing with Security Considerations.
12 .Detecting Malicious Packet Losses.
13 .Multipath Dissemination in Regular Mesh Topologies.
14 .A Faithful Distributed Mechanism for Sharing theCost of Multicast Transmissions.
15 .Movement-Assisted Connectivity Restoration inWireless Sensor and Actor
Networks.
16 .Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing
Analysis.
28.Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis
29.Congestion Control Algorithm for Tree-based Reliable Multicast Protocols.
30 .Security Agents for Network Traffic Analysis (SANTA).
31 .Capturing Router Congestion and Delay.
32 .Detecting Malicious Packet Losses.
33 .Dynamic Routing with Security Considerations.
34 .Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis.
35 .FEBA: A Bandwidth Allocation Algorithm for Service Differentiation in IEEE 802.16 Mesh
Networks.
36 .Joint Task Migration and Power Management in Wireless Computing.
37 .Large Connectivity for Dynamic Random Geometric Graphs.
38 .Measuring Capacity Bandwidth of Targeted Path Segments .
39 .Mitigating Denial-of-Service Attacks on The Chord Overlay Network:A Location Hiding Approach .
40 .Mitigatation Of Control Channel Jamming Under Node Capture Attacks.
41 .Monitoring the Application-Layer DDoS Attacks for Popular Websites .
42.Movement-Assisted Connectivity Restoration in Wireless Sensor and Actor Networks
43 .SIMPS: Using Sociology for Personal Mobility.
44 .Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures .
45.Multi-core Supported Network and System Security and Security in Next
Networks.
Generation Wireless