Zobrazeno 1 - 10
of 17
pro vyhledávání: '"Rajesh Talpade"'
Autor:
Carl A. Gunter, Paul Anderson, Geoffrey G. Xie, Jonathan M. Smith, Sanjai Narain, Charles Robert Kalmanek, Rajesh Talpade
Publikováno v:
IEEE Journal on Selected Areas in Communications. 27:249-252
The nine papers in this special issue focus on network infrastructure configuration and some of the problems encountered in the areas of specification, diagnosis, repair, synthesis, and anonymization.
Publikováno v:
IEEE Journal on Selected Areas in Communications. 24:1777-1780
Publikováno v:
Mobile Networks and Applications. 7:429-439
The Ad hoc Multicast Routing protocol (AMRoute) presents a novel approach for robust IP Multicast in mobile ad hoc networks by exploiting user-multicast trees and dynamic logical cores. It creates a bidirectional, shared tree for data distribution us
Publikováno v:
Computer Communications and Networks ISBN: 9781848828278
To set up network infrastructure satisfying end-to-end requirements, it is not only necessary to run appropriate protocols on components but also to correctly configure these components. Configuration is the “glue” for logically integrating compo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::cd31da991a2d63103e389662b8ab9c91
https://doi.org/10.1007/978-1-84882-828-5_9
https://doi.org/10.1007/978-1-84882-828-5_9
Autor:
Rajesh Talpade
Publikováno v:
2009 Cybersecurity Applications & Technology Conference for Homeland Security.
IP networks have come of age. They are increasingly replacing leased-line data infrastructure and traditional phone service, and are expected to offer Public Switched Telephone Network (PSTN)-quality service at a much lower cost. As a result, there i
Publikováno v:
ICDCS Workshops
Cyber-attackers often use incorrect source IP addresses in attack packets (spoofed IP packets) to achieve anonymity, reduce the risk of trace-back and avoid detection. We present the predictive ingress filtering (InFilter) approach for network-based
Autor:
F. Anjum, Rajesh Talpade
Publikováno v:
VTC Fall (2)
We present a scalable, effective and practical approach for detection of packet-drop attacks in ad hoc networks. In this attack, a malicious network node chooses to selectively drop packets that are supposed to be forwarded, which results in adverse
Publikováno v:
MILCOM 2005 - 2005 IEEE Military Communications Conference.
The use of IPSec for securing communication between nodes of wireless and mobile ad hoc networks has traditionally been considered difficult. We describe an IPSec-based architecture and implementation for ad hoc networks that can seamlessly handle no
Publikováno v:
Computer Security – ESORICS 2005 ISBN: 9783540289630
ESORICS
ESORICS
We embark into theoretical approaches for the investigation of intrusion detection schemes. Our main motivation is to provide rigorous security requirements for intrusion detection systems that can be used by designers of such systems. Our model capt
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::96933752a8ad0430427bd4c2e3b1cded
https://doi.org/10.1007/11555827_16
https://doi.org/10.1007/11555827_16
Publikováno v:
MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341).
This paper describes experiments for providing mobile users with continuous access to IP multicast groups using a multicast proxy. Although it is usually possible for a roaming node to directly connect with the multicast tree, we show that the costs