Learn More
Network-based attacks can be either persistent or sporadic. Persistent attack flows can be relatively easy to trace by mechanisms such as probabilistic packet marking, traffic logging, data mining etc. Sporadic attacks are sometimes easily detected by the Intrusion Detection Systems (IDSs) at the victims, but are hard to trace back to the attack origins. We(More)
In this paper we introduce two novel control slot scheduling approaches for creating dynamic contention free Time Division Multiple Access (TDMA) schedules. Our approaches are ideal for exchanging control information in Mobile Ad hoc Networks (MANET) and wireless mesh networks so that dynamic resource needs of participating nodes can be rapidly accommodated(More)
  • 1