Skip to main content
    • by 
    •   9  
      Distributed ComputingWireless Sensor NetworksSensor NetworkWireless Sensor
    • by 
    •   14  
      EngineeringTechnologySignal ProcessingNetwork Security
    • by 
    •   12  
      Network SecurityComputer NetworksNeural NetworkIntrusion Detection
Networks are prone to security attacks, and wireless infrastructure network is more vulnerable. The number of people preferring Wireless networks compared to the wired network has seen an expansion of user base owing to the fast and easy... more
    • by 
    •   5  
      IEEE 802.11 WLANWlanAccess PointDenial of Service Attacks
The 4-way Wi-Fi handshake is used to negotiate fresh pairwise keys, and authenticates both the client and Access Point (AP). We analyze this handshake, and discover several new denial-of-service (DoS) attacks against it. Interestingly,... more
    • by 
    •   5  
      Wi-FiNetwork Protocols802.11Denial of Service Attacks
    • by  and +2
    •   8  
      Computer ScienceObject Oriented ProgrammingProtocolsAvailability
Countermeasures against denial of service attacks and node misbehaviour are mandatory requirements in MANET. Essential network operations assuring basic connectivity can be heavily jeopardized by nodes that do not properly execute their... more
    • by 
    •   5  
      Mobile Ad Hoc NetworksMobile Ad Hoc NetworkRrDenial of Service Attack
    • by 
    •   14  
      EngineeringTechnologySignal ProcessingNetwork Security
    • by 
    •   14  
      EngineeringTechnologySignal ProcessingNetwork Security
In a communication network, an advanced security system should include three security processes, namely a packet filter (Firewall), an intrusion detection system (IDS), and a covert channels detection system (CCDS). The Firewall filters... more
    • by  and +1
    •   17  
      DoS AttackCommunication NetworksCommunication NetworkIntrusion Detection
    • by 
    •   9  
      Distributed ComputingTime SeriesStatistical AnalysisAnomaly Detection
    • by 
    •   9  
      HistoryCloud ComputingAuthenticationIEEE
    • by 
    •   19  
      Distributed ComputingComputer Science EducationNetwork SecurityComputer Networks
    • by 
    •   12  
      DoS AttackExperimental ResearchSampling methodsAssembly
    • by 
    •   14  
      Competitive IntelligenceDynamic Spectrum AccessCognitive radioSystem Design
Despite a plethora of research in the area, none of the mechanisms proposed so far for Denial-of-Service (DoS) mitigation has been widely deployed. We argue in this paper that these deployment difficulties are primarily due to economic... more
    • by 
    •   11  
      BusinessNetwork SecuritySocial WelfareVirtual Private Network
Data security plays a crucial role in healthcare monitoring systems, since critical patient information is transacted over the Internet, especially through wireless devices, wireless routes such as optical wireless channels, or optical... more
    • by 
    •   8  
      Computer ScienceOptical NetworksComputationComput
Recently, several papers have studied the possibility of shrinking buffer sizes in Internet core routers to just a few dozen packets under certain constraints. If proven right, these results can open doors to building all-optical routers,... more
    • by 
    •   9  
      Computer ScienceDoS AttackDegradationThroughput
Data security plays a crucial role in healthcare monitoring systems, since critical patient information is transacted over the Internet, especially through wireless devices, wireless routes such as optical wireless channels, or optical... more
    • by 
    •   5  
      Optical NetworksHealthcare monitoringvpn SecurityDenial of Service Attacks
    • by  and +1
    •   12  
      DoS AttackExperimental ResearchSampling methodsAssembly
    • by 
    •   8  
      Computer ScienceObject Oriented ProgrammingProtocolsAvailability
Data security plays a crucial role in healthcare monitoring systems, since critical patient information is transacted over the Internet, especially through wireless devices, wireless routes such as optical wireless channels, or optical... more
    • by 
    •   8  
      Computer ScienceOptical NetworksComputationComput