نتایج جستجو برای: misbehavior

تعداد نتایج: 965  

Journal: :Journal of Empirical Research on Human Research Ethics 2006

Journal: :EURASIP Journal on Advances in Signal Processing 2009

2016
Neha Pathak

A PTP method in network security for misbehavior detection system is a method of detecting malicious misbehavior activity within networks. The System detects the malicious node and blocks them by adding into Blacklist. Malicious nodes are the compromised machine present in the network, which performs the task given by bot server i.e. it does not forward the legitimate message to another node in...

2011

Self-organizing emergent multi-agent systems are a solution to reducing the operational expenditures of complex information technology systems. However, emergent behavior is inherently unpredictable, sacrificing the guarantee of efficiency for flexibility and scalability. The addition of self-adaptation through an Efficiency Improvement Advisor (EIA) provides the ability to increase efficiency ...

2009
Manfred Georg Sergey Gorinsky

This paper examines the operation of TFRC (TCPFriendly Rate Control) in scenarios where the receiver is untrustworthy. By misbehaving, a TFRC receiver can obtain a higher data rate at the expense of competing traffic. We identify and experimentally confirm several such attacks and designed Robust TCP-Friendly Rate Control (RTFRC), a TFRC variant which is resilient to receiver misbehavior. We al...

2014
A. Janani A. Sivasubramanian

Mobile Ad-hoc NETwork (MANET) is an application of wireless network with self-configuring mobile nodes. MANET does not require any fixed infrastructure. Its development never has any threshold range. Nodes in MANET can communicate with each other if and only if all the nodes are in the same range. This wide distribution of nodes makes MANET vulnerable to various attacks, packet dropping attack ...

2008
Guan-Yu Huang Shun-Yun Hu Jehn-Ruey Jiang

Networked virtual environments (VEs) such as Massively Multiplayer Online Games (MMOGs) have become very popular in recent years. However, existing client-server architectures suffer from resource constrains when the number of concurrent users increases. Research on peer-to-peer virtual environments (P2P-VEs) thus tries to create more scalable and affordable VEs via the resource sharing of mutu...

2005
Lukas Kunz

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) is probably the most widespread multiple access protocol in use today, mainly due to the tremendous success of the IEEE 802.11 suite of standards. Until now most of the studies done about the protocol have focused on maximizing the performance. However as the bands become more crowded and the user terminals become easier to reconf...

2005
LUKAS KUNZ

The focus of this thesis lies in investigating possible abuse of the standardized medium access protocol 802.11a within Wireless Local Area Networks (WLAN). By modifying the Contention Window (CW), a network can capture more traffic in expense of its rivals. The competing network scenarios are modeled by the use of Game Theory, applying simple and repeated form games. We argue that by modifying...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید