Tom Karygiannis

Learn More
Numerous schemes have been proposed for secure routing and intrusion detection for ad hoc networks. Yet, little work exists in actually implementing such schemes on small handheld devices. In this paper, we present a proof-of-concept implementation of a secure routing protocol based on AODV over IPv6, further reinforced by a routing protocol independent(More)
interfaces Low Unpredictability Medium Knowledge sharing Medium Table 3: Architecture Research Area Ratings Research Objective 3: Use MA technology to overcome shortcomings of current IDS architectures. Research Area Rating Asynchronous execution and autonomy Medium Structure and composition High Adapting dynamically Medium Operating in a heterogeneous(More)
Introducing Emerging Standards IEEE Security & Privacy announces the formation of a new department for the magazine—Emerging Standards. Tim Grance, Ramaswamy Chandramouli, and Rick Kuhn, of the US National Institute of Standards and Technology, and Susan Landau from Sun Microsystems, are the co­ editors of this department, which will concentrate on security(More)
The adoption of wireless technologies and handheld devices is becoming widespread in business, industry, and government organizations. The use of handheld devices introduces new risks to existing enterprise computing resources. Therefore, organizations require new strategies to mitigate the security risks associated with the integration of wireless(More)
The proliferation of mobile handheld devices, such as Personal Digital Assistants (PDAs) and tablet computers, within the workplace is expanding rapidly. While providing productivity benefits, the ability of these devices to store and transmit corporate information through both wired and wireless networks poses potential risks to an organization’s security.(More)