Discovery Network

Results: 677



#Item
91Computing / Intrusion detection system / Alert correlation / Thresh / Bayesian network / Snort / Intrusion detection system evasion techniques / Computer network security / Software / System software

Reasoning about Complementary Intrusion Evidence∗ Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeves Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh, NC

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:25:57
92Public-key cryptography / ANT / Sensor node / Telecommunications engineering / Wireless sensor network / Technology / Computing

Multi-Level µTESLA: Broadcast Authentication for Distributed Sensor Networks DONGGANG LIU and PENG NING North Carolina State University Broadcast authentication is a fundamental security service in distributed sensor n

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:17
93Telecommunications engineering / Sensor node / ANT / Key distribution in wireless sensor networks / Key distribution / Wireless sensor network / Technology / Computing

/Users/donggangliu/Desktop/work/iSec/GroupPreDistribution/paper.dvi

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:20
94Domain name system / Internet standards / IPv6 / Domain Name System Security Extensions / ICMPv6 / IPv4 / NLnet / Name server / Router / Network architecture / Internet / Internet protocols

Using Path MTU Discovery (PMTUD) for a higher DNS responsiveness Willem Toorop NLnet

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2013-05-31 10:00:18
95Tree / Wireless sensor network / Computing / Chord / Distributed data storage / Wireless networking / Knowledge representation

An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu1 Sanjeev Setia1∗ Sushil Jajodia1,2 1 Center for Secure Information Systems George Mason University

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:14
96Telecommunications engineering / Computing / Signal processing / Estimation theory / Sensor node / Anchor / ANT / Wireless ad-hoc network / Wireless sensor network / Wireless networking / Technology

Cluster-Based Minimum Mean Square Estimation for Secure and Resilient Localization in Wireless Sensor Networks∗ Cliff Wang U.S. Army Research Office Email:

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:21
97Telecommunications engineering / Sensor node / International Conference on Information Processing in Sensor Networks / TinyOS / Conference on Embedded Networked Sensor Systems / Crossbow Technology / ANT / Wireless sensor network / Technology / Computing

Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks Using Seluge (Demo Abstract) An Liu, Young-Hyun Oh, Peng Ning Cyber Defense Laboratory Department of Computer Science North Carolina State Universit

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:16
98Internet protocols / Internet standards / Internet Control Message Protocol / Computer network security / Ping / ICMP Destination Unreachable / Path MTU Discovery / Transmission Control Protocol / ICMP Source Quench / Computing / Internet / Network architecture

PDF Document

Add to Reading List

Source URL: www.gont.com.ar

Language: English - Date: 2011-11-08 11:20:09
99Internet protocols / Internet standards / Internet Control Message Protocol / Path MTU Discovery / ICMPv6 / ICMP Destination Unreachable / Internet Protocol / Transmission Control Protocol / Traffic flow / Computing / Internet / Network architecture

Microsoft Word - draft-gont-tcpm-icmp-attacks-02.txt

Add to Reading List

Source URL: www.gont.com.ar

Language: English - Date: 2011-11-08 11:19:25
100Routing protocols / Computing / IP multicast / Multicast Source Discovery Protocol / Protocol Independent Multicast / Multicast / Multiprotocol BGP / Border Gateway Protocol / IP address / Network architecture / Internet protocols / Internet

Multicast Peering Steve Rubin Layer42 Networks What is IP Multicast?

Add to Reading List

Source URL: www.seattleix.net

Language: English - Date: 2009-04-10 14:59:04
UPDATE