On security-aware transmission scheduling


The problem of interest is to characterize to what extent nodes independently following certain transmission schedules can be hijacked to relay flows of information packets. Information flows can be embedded in given transmission schedules by properly adding delays and inserting dummy packets. Such hidden flows are usually indicators of network intrusion… (More)
DOI: 10.1109/ICASSP.2008.4517951


4 Figures and Tables

Slides referencing similar topics