Posts by Network Simulator 2

Detection of gray hole in MANET through cluster analysis

Detection of gray hole in MANET through cluster analysis

Mobile Ad-Hoc Networks are autonomous and decentralized wireless systems. MANETs consist of mobile nodes that are free in moving in and out...

Solving security issues in mobile computing using cryptography techniques — A Survey

Solving security issues in mobile computing using cryptography techniques — A Survey

Advancements in wireless networking have initiated the idea of mobile computing, where the user does not have to be bound to a...

GSIS: Group Signature and ID-based Signature-Based Secure and Privacy-Preserving Protocol

GSIS: Group Signature and ID-based Signature-Based Secure and Privacy-Preserving Protocol

This chapter examines the problem of security assurance and conditional privacy preservation in vehicular communication applications. It introduces a novel security and privacy preserving...

Distributed Attack Graph Generation

Distributed Attack Graph Generation

Attack graphs show possible paths that an attacker can use to intrude into a target network and gain privileges through series of...

Intrusion detection system using fuzzy genetic algorithm

Intrusion detection system using fuzzy genetic algorithm

Computer security has become an important part of the day today’s life. Not only single computer systems but an extensive network of the computer...

Multistage OCDO: Scalable Security Provisioning Optimization in SDN-Based Cloud

Multistage OCDO: Scalable Security Provisioning Optimization in SDN-Based Cloud

Cloud computing is increasingly changing the landscape of computing, however, one of the main issues that is refraining potential customers...

Cloud-Trust – a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds

Cloud-Trust – a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds

The vulnerability of Cloud Computing Systems (CCSs) to Advanced Persistent Threats (APTs) is a significant concern to government and industry....

A clean slate design for secure wireless ad-hoc networks — Part 2: Open unsynchronized networks

A clean slate design for secure wireless ad-hoc networks — Part 2: Open unsynchronized networks

We build upon the clean-slate, holistic approach to the design of secure protocols for wireless ad-hocnetworks proposed in part one. We...

Multi-block ADMM for big data optimization in smart grid

Multi-block ADMM for big data optimization in smart grid

In this paper, we review the parallel and distributed optimization algorithms based on alternating direction method of multipliers (ADMM) for...

A Risk Analysis Model for PACS Environments in the Cloud

A Risk Analysis Model for PACS Environments in the Cloud

This study presents some of the most important checkpoints found in the deployment or migration projects for PACS (Picture Archiving...

1 2 3 4 5 6 7 8 9 10

NS2 Member Accounts | |
© 2005 - 2024 Vanet Projects

© 2005 - 2024 Matlab Projects