[PDF][PDF] Security Attacks and Vulnerability Analysis in Mobile Wireless Networking
Security of data is very important while providing communication either by the wired or
wireless medium. It is a very challenging issue in the world and the wireless mobile network …
wireless medium. It is a very challenging issue in the world and the wireless mobile network …
EventMon: Real-Time Event-based Streaming Network Monitoring Data Recovery
Data recovery is a fundamental task for sparse network monitoring with a significant impact
on many downstream tasks, such as congestion control, network capacity planning, and …
on many downstream tasks, such as congestion control, network capacity planning, and …
MMP: A Dynamic Routing Protocol Design to Proactively Defend against Wireless Network Inference Attacks
Network inference refers to the process of extracting sensitive information from a network
without directly accessing it. This poses a significant threat to network security since it allows …
without directly accessing it. This poses a significant threat to network security since it allows …
DRL-Tomo: a deep reinforcement learning-based approach to augmented data generation for network tomography
Accurate and current comprehension of network status is crucial for efficient network
management. Nevertheless, direct network measurement strategies entail substantial traffic …
management. Nevertheless, direct network measurement strategies entail substantial traffic …
Enhanced-Longest Common Subsequence based novel steganography approach for cloud storage
Cloud storage is an essential and most demanding application for enterprise and private
use in today's communication. However, the data security over the distributed cloud …
use in today's communication. However, the data security over the distributed cloud …
Stealthy dgos attack against network tomography: The role of active measurements
As a tool to infer the internal state of a network that cannot be measured directly, network
tomography has been extensively studied under the assumption that the measurements …
tomography has been extensively studied under the assumption that the measurements …
网络诊断技术研究综述
许晓佳, 王永才, 李德英 - 智能科学与技术学报, 2023 - infocomm-journal.com
网络诊断是一种高效且方便的通过端到端路径的性能测量来推断网络内部状态的方法,
在有线和无线网络的链路测量和故障定位中得到了广泛应用. 对网络诊断的4 …
在有线和无线网络的链路测量和故障定位中得到了广泛应用. 对网络诊断的4 …
Evaluating Network Boolean Tomography Under Byzantine Attacks
It is vital to closely track the operation statuses of network-internal links. Accurate knowledge
of the operation statuses of network-internal links is vital for the management of many …
of the operation statuses of network-internal links is vital for the management of many …
LSA: Understanding the Threat of Link-Based Scapegoating Attack in Network Tomography
Network tomography is a powerful and convenient tool to infer the internal states of a
network via end-to-end path measurements. However, this article shows that when …
network via end-to-end path measurements. However, this article shows that when …
Learning About and Over Networks: Optimized Designs for Network Tomography and Decentralized Learning
CC Chiu - 2024 - search.proquest.com
In the context of this dissertation, learning in network includes to two parts: learning about
network and learning over network. The former refers to applying network tomography to …
network and learning over network. The former refers to applying network tomography to …