×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [presence of malicious]
AODV Protocol
1.519 views
Cyber Security in Evolving Enterprise Environments TechNet International 09 Adrian R Hartman, PhD Senior Manager & Architect LGS Innovations, Bell Labs
217 views
HMM-Based Malicious User Detection for Robust Collaborative Spectrum Sensing
222 views
Overview - Kupcu
218 views
Iaetsd a layered security approach through femto cell using
41 views
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion
223 views
Secure routing for structured peer-to-peer overlay networks Miguel Castro, Ayalvadi Ganesh, Antony Rowstron Microsoft Research Ltd. Peter Druschel, Dan
222 views
CS162 Operating Systems and Systems Programming Lecture 24 Distributed File Systems November 26, 2007 Prof. John Kubiatowicz cs162
213 views
MODELING AND ANALYSIS OF ATTACKS AND COUNTER DEFENSE MECHANISMS FOR CYBER PHYSICAL SYSTEMS -Robert Mitchell, Ing-Ray Chen, Member, IEEE Presented By, Manasa
215 views
Speaker : Hong-Ren Jiang A Novel Testbed for Detection of Malicious Software Functionality 1
213 views
a crime committed on a computer network, esp. the Internet
216 views
Robust Trust Establishment for MANETs
34 views
Next >