Now showing items 1-6 of 6
Communication / Computation Trade-offs in Wireless Sensor Networks: Comparing Network-Level and Node-Level Strategies
In wireless sensor networks, nodes having limited battery resources convey data to an energy-unconstrained base station. The amount of data transmitted by a node usually depends on how much local processing is performed. ...
The Impact of Bandwidth Constraints on the Energy Consumption of Wireless Sensor Networks
Optimization of flows to maximize Wireless Sensor Network (WSN) lifetime is a problem already investigated in various aspects. However, most studies ignored the effects of finite bandwidth. As source data rate of sensor ...
Automated generation of attack graphs using NVD
(Association for Computing Machinery, Inc., 2018)
Today’s computer networks are prone to sophisticated multi-step, multi-host attacks. Common approaches of identifying vulnerabilities and analyzing the security of such networks with naive methods such as counting the ...
charPattern: Rethinking Android Lock Pattern to Adapt to Remote Authentication
(SPRINGER INT Publishing AG, 2015)
Android Lock Pattern is popular as a screen lock method on mobile devices but it cannot be used directly over the Internet for user authentication. In our work, we carefully adapt Android Lock Pattern to satisfy the ...
How Safe Is Safety Number? A User Study on SIGNAL’s Fingerprint and Safety Number Methods for Public Key Verification
(Springer Verlag, 2018)
Communication security has become an indispensable demand of smartphone users. End-to-end encryption is the key factor for providing communication security, which mainly relies on public key cryptography. The main and ...
A First Look at the Usability of OpenVAS Vulnerability Scanner
Vulnerability scanning is a fundamental step for assuring system security. It is also an integral component of IT system risk assessment to manage the identified vulnerabilities in a timely and prioritized way. It is ...