×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [presence of malicious]
AODV Protocol
1.526 views
Cyber Security in Evolving Enterprise Environments TechNet International 09 Adrian R Hartman, PhD Senior Manager & Architect LGS Innovations, Bell Labs
218 views
HMM-Based Malicious User Detection for Robust Collaborative Spectrum Sensing
223 views
Overview - Kupcu
223 views
Iaetsd a layered security approach through femto cell using
42 views
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion
223 views
Secure routing for structured peer-to-peer overlay networks Miguel Castro, Ayalvadi Ganesh, Antony Rowstron Microsoft Research Ltd. Peter Druschel, Dan
224 views
CS162 Operating Systems and Systems Programming Lecture 24 Distributed File Systems November 26, 2007 Prof. John Kubiatowicz cs162
217 views
P561: Network Systems Week 9: Network Security Tom Anderson Ratul Mahajan TA: Colin Dixon
218 views
Structured peer to peer overlay networks are resilient – but not secure. Even a small fraction of malicious nodes may result in failure of correct
230 views
RATEWeb: Reputation Assessment Framework for Trust Establishment among Web Services Zaki Malik, Athman Bouguettaya Hung-Yuan Chung Yen-Cheng Lu
217 views
MODELING AND ANALYSIS OF ATTACKS AND COUNTER DEFENSE MECHANISMS FOR CYBER PHYSICAL SYSTEMS -Robert Mitchell, Ing-Ray Chen, Member, IEEE Presented By, Manasa
215 views
Next >