搜索结果: 1-6 共查到“Self-organizing networks”相关记录6条 . 查询时间(0.062 秒)
Towards a Probabilistic Complexity-theoretic Modeling of Biological Cyanide Poisoning as Service Attack in Self-organizing Networks
biochemical science based on complexity theory
2012/6/14
We draw an analogy of \emph{biological cyanide poisoning} to security attacks in self-organizing mobile ad hoc networks. When a circulatory system is treated as an enclosed network space, a hemoglobin...
Towards a Probabilistic Complexity-theoretic Modeling of Biological Cyanide Poisoning as Service Attack in Self-organizing Networks
foundations / biochemical science based on complexity theory
2012/3/22
We draw an analogy of \emph{biological cyanide poisoning} to security attacks in self-organizing mobile ad hoc networks. When a circulatory system is treated as an enclosed network space, a hemoglobin...
Towards a Probabilistic Complexity-theoretic Modeling of Biological Cyanide Poisoning as Service Attack in Self-organizing Networks
foundations biochemical science based on complexity theory
2012/3/21
We draw an analogy of \emph{biological cyanide poisoning} to security attacks in self-organizing mobile ad hoc networks. When a circulatory system is treated as an enclosed network space, a hemoglobin...
Attack vulnerability of self-organizing networks
Self-organizing networks Power grids Cascading failures Vulnerability
2012/4/14
There are several self-organizing networks in the real world, and these networks severely affect the development of the modern society. This paper investigates the vulnerability of self-organizing net...
The Spread of Viruses and Bugs in Self Organizing Networks
The self-organizing network The Spread of Viruses
2011/8/29
We review recent progress made in analyzing the spread of viruses and bugs in the internet. We describe how the use of a model that takes into account the complex inhomogeneity of the internet and its...
GVG-RP: A Net-centric Negligibility-based Security Model for Self-organizing Networks
Net-centric Security Negligibility Scalability
2008/11/14
We present a rigorous approach to building a secure self-organizing mobile ad hoc network (MANET). In a highly dynamic environment like MANET, it is impossible to ensure absolute security to protect e...