نتایج جستجو برای: misbehavior
تعداد نتایج: 965 فیلتر نتایج به سال:
In late-age silicon, soft errors become an issue even for low-margin products. Since classical hardening techniques are associated with costs which may not be acceptable for such ICs, selective hardening which targets only a subset of all possible soft errors has been suggested. We propose a soft error selection method based on severity of an error’s impact on system behavior. Some soft errors ...
Mobile Ad Hoc Network (MANET) system is not only subject to most of the well known attacks and threats that the wired and conventional wireless network suffered, but also a large number of additional attacks and threats. Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. Security is not a single layer issue but a mult...
IYER, VARAGUR K. Misbehavior Resistant Fair Scheduling in Wireless Backhaul Mesh Networks. (Under the direction of Dr. Peng Ning). Wireless Mesh Networks (WMNs) are increasingly becoming popular as a means to realizing cost-effective and efficient public area networks. WMNs provide improved coverage with relatively cheaper infrastructure and are easy to deploy and expand as compared to Wireless...
One approach to detecting insider misbehavior is to monitor system call activity and watch for danger signs or unusual behavior. We describe an experimental system designed to test this approach. We tested the system’s ability to detect common insider misbehavior by examining file system and process-related system calls. Our results show that this approach can detect many such activities. *
The continuous students’ misbehavior necessitates careful consideration because there are several different pressures leading to adolescent at school. One of the contributing factors is peer pressure among students. This study therefore, identifies that need investigate influence on adolescents’ secondary school A sample two hundred (200) students from ten (10) schools (5 public and 5 private) ...
Selfish hosts in wireless networks that fail to adhere to the MAC protocol may obtain an unfair share of the channel bandwidth. We present modifications to the IEEE 802.11 backoff mechanism to simplify detection of such selfish hosts. We also present a correction scheme for penalizing greedy misbehavior which attempts to restrict the misbehaving nodes to a fair share of the channel bandwidth. S...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید