نتایج جستجو برای: primary user emulation attack

تعداد نتایج: 950393  

2007

This document presents the detailed design of the two main defense approaches under development within the project MILTIADES, namely the IP address space randomiza-tion proactive defense technique against hit-list worms, and the emulation-based poly-morphic attack detection technique.

Journal: :CoRR 2010
Shahrukh Khalid Adnan Ali Khan

A number of data acquisition systems depend on human interface to access computer for measuring, processing and analyzing data and to prepare it for presentation and storage. Data acquisition software is installed on the computer and all intended operations are performed manually. The data acquisition software requires user intervention for operations like selection of measurement setup, acquis...

2002
Pei Zheng Lionel M. Ni

The increasing need of protocol development environments and network performance evaluation tools gives rise to the research of flexible, scalable, and accurate network emulators. The desired network emulator should be able to facilitate the emulation of either wireline or wireless networks. In the case when network topology is critical to the underlying network protocol, the emulator should pr...

2003
Pei Zheng Lionel M. Ni

The increasing need of protocol development environments and network performance evaluation tools gives rise to the research of flexible, scalable, and accurate network emulators. The desired network emulator should be able to facilitate the emulation of either wireline or wireless networks. In the case when network topology is critical to the underlying network protocol, the emulator should pr...

2010
Dirk von Suchodoletz

Despite significant research and the proven usefulness for complex, dynamic and interactive objects emulation remains not widely adapted in digital preservation. While some significant building blocks of emulation based strategies are present a number of components are still unsatisfactory or missing. This paper proposes a research agenda for the future integration of emulation into preservatio...

Journal: :J. Internet Serv. Inf. Secur. 2015
David S. Jackson Wanyu Zang Qijun Gu Meng Yu

Cognitive radio networks can sense, detect, and monitor their surrounding radio frequency conditions including the interference and availability of a broad range of channels, followed by choosing the best possible channel for a given task. This is called Dynamic Spectrum Access (DSA) and it is a key characteristic of cognitive radios that enable them to operate on unused licensed channels. Howe...

Journal: :TELKOMNIKA (Telecommunication Computing Electronics and Control) 2017

2012
Fan Zhai Ibrahim Matta George Rouskas Christoph Werle Majid Ghaderi

Network emulation is an efficient method for evaluating distributed applications and communication protocols by combining the benefits of real world experiments and network simulation. The process of network emulation involves the execution of connected virtual nodes running the software under test in a controlled environment. Our Network Emulation Testbed (NET) achieves high scalability by com...

Journal: :JCM 2012
Andreas Grau Klaus Herrmann Kurt Rothermel

Network emulation is an efficient method for evaluating distributed applications and communication protocols by combining the benefits of real world experiments and network simulation. The process of network emulation involves the execution of connected virtual nodes running the software under test in a controlled environment. Our Network Emulation Testbed (NET) achieves high scalability by com...

Journal: :IACR Cryptology ePrint Archive 2014
Xiaojun Yu Qiaoyan Wen

In order to satisfy the different requirements of provable data possession in cloud computing, a multi-function provable data possession (MF-PDP) is proposed, which supports public verification, data dynamic, unlimited times verification, sampling verification. Besides, it is security in RO model and it is verification privacy under half trust model and can prevent from replacing attack and rep...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید