Posts by Network Simulator 2

A Secure Clustering in MANET through Direct Trust Evaluation Technique

A Secure Clustering in MANET through Direct Trust Evaluation Technique

Ad hoc network is a self organizing wireless network, made up of mobile nodes that act in both way as node and router....

AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context

AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context

Mobile malware attempts to evade detection during app analysis by mimicking security-sensitive behaviors of benign apps that provide similar functionality (e.g.,...

Relative Generalized Rank Weight of Linear Codes and Its Applications to Network Coding

Relative Generalized Rank Weight of Linear Codes and Its Applications to Network Coding

By extending the notion of minimum rank distance, this paper introduces two new relative code parameters of a linear code...

Advanced approaches for wireless sensor network applications and cloud analytics

Advanced approaches for wireless sensor network applications and cloud analytics

Although wireless sensor network applications are still at early stages of development in the industry, it is obvious that it will pervasively...

Security issues and their solutions in MANET

Security issues and their solutions in MANET

A mobile ad hoc network is a dynamic network of mobile hosts that does not have any centralized administration framework. Nodes in this network are self-organizing...

FAA Aircraft Systems Information Security Protection overview

FAA Aircraft Systems Information Security Protection overview

The purpose of this paper is to provide an overview of Aircraft Systems Information Security Protection (ASISP) from an FAA AVS perspective....

Obfuscation of Sensitive Data for Incremental Release of Network Flows

Obfuscation of Sensitive Data for Incremental Release of Network Flows

Large datasets of real network flows acquired from the Internet are an invaluable resource for the research community. Applications include network modelling and...

PJCT: Penetration testing based JAVA code testing tool

PJCT: Penetration testing based JAVA code testing tool

Security is the key concern for every system, network or application. Penetration Testing in Software engineering and System Security in Computer Networks are key areas in secure...

Cyber security education as a tool for trust-building in cross-border public protection and disaster relief operations

Cyber security education as a tool for trust-building in cross-border public protection and disaster relief operations

Public protection and disaster relief (PPDR) operations are increasingly more dependent on networks and data processing infrastructure. Incidents such as...

Deploying agents in the network to detect intrusions

Deploying agents in the network to detect intrusions

Intrusion Detection in a network is defined as identifying activities which violate security policies. Traditional Intrusion Detection Systems (IDSs) are centralized in nature where...

1 2 3 4 5 6 7 8 9 10

NS2 Member Accounts | |
© 2005 - 2024 Vanet Projects

© 2005 - 2024 Matlab Projects