Although the need for protocol extensions dealing with cooperation issues for ad hoc routing protocols is undoubtedly accepted, it is still a question of belief whether such protocol extensions… (More)
Mobile ad hoc networks are based on the assumption that all participants of the network cooperate and forward packets towards destinations. Unfortunately, there are no mechanisms to enforce… (More)
This paper describes the prototype system of a secure shell proxy intrusion detection system (called EPIDS) that controls SSH-connections between clients and servers. EPIDS is a transparent proxy… (More)