×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
The top documents tagged [presence of malicious]
Education
AODV Protocol
1.525 views
Documents
Cyber Security in Evolving Enterprise Environments TechNet International 09 Adrian R Hartman, PhD Senior Manager & Architect LGS Innovations, Bell Labs
218 views
Documents
HMM-Based Malicious User Detection for Robust Collaborative Spectrum Sensing
223 views
Documents
Overview - Kupcu
219 views
Engineering
Iaetsd a layered security approach through femto cell using
41 views
Documents
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion
223 views
Documents
Secure routing for structured peer-to-peer overlay networks Miguel Castro, Ayalvadi Ganesh, Antony Rowstron Microsoft Research Ltd. Peter Druschel, Dan
223 views
Documents
CS162 Operating Systems and Systems Programming Lecture 24 Distributed File Systems November 26, 2007 Prof. John Kubiatowicz cs162
217 views
Documents
P561: Network Systems Week 9: Network Security Tom Anderson Ratul Mahajan TA: Colin Dixon
218 views
Documents
Structured peer to peer overlay networks are resilient – but not secure. Even a small fraction of malicious nodes may result in failure of correct
230 views
Documents
RATEWeb: Reputation Assessment Framework for Trust Establishment among Web Services Zaki Malik, Athman Bouguettaya Hung-Yuan Chung Yen-Cheng Lu
217 views
Documents
MODELING AND ANALYSIS OF ATTACKS AND COUNTER DEFENSE MECHANISMS FOR CYBER PHYSICAL SYSTEMS -Robert Mitchell, Ing-Ray Chen, Member, IEEE Presented By, Manasa
215 views
Next >