Within the last year
Within the past 3 years
1 - 5 of 5 articles
Anomaly-based intrusion detection is about the discrimination of malicious and legitimate behaviors on the basis of the characterization of system normality in terms of particular observable subjects. As the system normality is constructed solely from an observed sample of normally occurring...
A major challenge in wireless terrestrial networks is to provide large-scale reliable multicast and broadcast services. The main problem limiting the scalability of such networks is feedback implosion, a problem arising when a large number of users transmit their feedback messages through the...
Network applications are increasingly required to be autonomous, scalable, adaptive to dynamic changes in the network, and survivable against partial system failures. Based on the observation that various biological systems have already satisfied these requirements, this article proposes and...
In this article we study the data dissemination problem in which data items are flooded to all the moving objects in a mobile ad hoc network by peer-to-peer transfer. We show that if memory and bandwidth are bounded at moving objects, then the problem of determining whether a set of data items...
Save this article to read later. You can see your Read Later on your DeepDyve homepage.
To save an article, log in first, or sign up for a DeepDyve account if you don't already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don't already have one.
Read and print from thousands of top scholarly journals.
Sign up with Facebook
Sign up with Google
Already have an account? Log in
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don't already have one.