PTCA635 发表于 2025-3-28 17:49:59

Robust Routing in Malicious Environment for Ad Hoc Networkse simulation results that demonstrate that our approach increases the throughput by at least ten percent in a network where fifty percent of the nodes are malicious when compared to an approach that selects the shortest route. Furthermore, our approach incurs only a small delay when compared to the delay along the shortest route.

incubus 发表于 2025-3-28 19:53:47

Measuring Resistance to Social Engineeringountermeasures, we need a SE resistance metric. This paper de.nes such a metric. We have also implemented software to obtain metric test data. A real life SE experiment involving 120 participants has been completed. The experiment suggests that SE may indeed represent an Achilles heel.

使尴尬 发表于 2025-3-29 00:28:52

Model Redundancy vs. Intrusion Detectionand after model redundancy is compared. The preliminary experimental results show that the model redundancy in the behavior model is useful to detect novel intrusions, but the model redundancy due to the overlapping distinguishability among features is insignificant for intrusion detection.

organism 发表于 2025-3-29 05:26:43

0302-9743 f information security technologies become pervasive, - sues pertaining to their deployment and operation are becoming increasingly important. ISPEC is intended to be an annual conference that brings together researchers and practitioners to provide a con?uence of new information se- rity technologi

CIS 发表于 2025-3-29 10:34:41

http://reply.papertrans.cn/47/4654/465325/465325_45.png

intrigue 发表于 2025-3-29 13:59:27

http://reply.papertrans.cn/47/4654/465325/465325_46.png

Collar 发表于 2025-3-29 18:04:41

http://reply.papertrans.cn/47/4654/465325/465325_47.png

伪善 发表于 2025-3-29 21:15:29

Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Methodrabilities are explored, and associated techniques are provided to mitigate these vulnerabilities. We also analyzed the existing architecture types of AAA integrated network security solutions, 802.1X and VPNs. We have extensively analyzed the effect of crypto parameters over WLAN based on packet le

禁止 发表于 2025-3-30 03:53:03

Robust Routing in Malicious Environment for Ad Hoc Networks authenticity of the route. Availability of the network in a malicious environment has largely been ignored..In this paper, we divide the secure routing problem into two layers. The first layer provides authenticated routing and the second layer provides a route selection algorithm that selects a ro

跑过 发表于 2025-3-30 06:40:13

http://reply.papertrans.cn/47/4654/465325/465325_50.png
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Information Security Practice and Experience; First International Robert H. Deng,Feng Bao,Jianying Zhou Conference proceedings 2005 Spring