We investigate the impact of node capture attacks on the confidentiality and integrity of network traffic. We map the compromise of network traffic to the ... P Tague,D Slater,J Rogers,... - IEEE 被引量: 46发表: 2008年 An approach for modeling vulnerability of the network of networks A...
Two basic scenarios are presented: (1) indoor-to-outdoor propagation for a local area network operating in a two story building, and (2) a wireless point-to-point link on an airbase. The simulations illustrate some of the unique propagation conditions that occur inside of buildings and in ...
Critical effect of dependency groups on the function of networks Current network models assume one type of links to define the relations between the network entities. However, many real networks can only be correctly des... R Parshani,SV Buldyrev,S Havlin - 《Proceedings of the National ...
We developed a percolation approach for the behavior of generalized random graphs with a known connectivity distribution of links k per node, P(k), under both random breakdown of nodes and intentional attack on the most highly connected nodes. We focus on scale free networks, such as the Inter...
This paper is focused on the propagation of failures within a core telecommunication network (i.e. virus or malicious code spreading), which are commonly represented using epidemic models. This work conducts an analysis of the vulnerability of five core telecommunication networks subject to different ...
Evaluating Kismet and NetStumbler as Network Security Tools & Solutions. Despite advancement in computer firewalls and intrusion detection systems, wired and wireless networks are experiencing increasing threat to data theft and violations through personal and corporate computers and networks. The ubiquitous ...
Road network vulnerability under area-covering disruptions The vulnerability of road networksunder area-covering disruptions. Jenelius E,Mattsson L. http://www.in-fra.kth.se/tla/projects/vulnerability/Paper-INFORMS-2008.pdf . 2009Jenelius E,Mattsson L.The vulnerability of road networksunder ... E...
Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical mode...
Multiscale vulnerability of complex networks We present a novel approach to quantify the vulnerability of a complex network, i.e., the capacity of a graph to maintain its functional performance under ... S Boccaletti,J Buldu?,R Criado,... - 《Chaos An Interdisciplinary Journal of Nonlinear ...
WLAN has become a hot application in the field of telecommunication in both domestic and abroad.WLAN technique is becoming more and more well rounded.People are more and more aware of its security.This article makes a brief introduction to the principle of WEP and RC4.Discussion of several majo...