Results 1 to 10 of about 1,052,363 (331)

Detecting and Quantifying Networks of Biological Kinship via Exponential Family Random Graph Models

open access: yes
Rohrlach AB   +5 more
europepmc   +1 more source

On the impacts of join and leave on the propagation ratio of topology-aware active worms

open access: closedProceedings of the 4th international conference on Security of information and networks, 2011
Today, the propagation of active worms in peer-to-peer (P2P) networks is a very serious issue. Therefore, studying the propagation behavior of active worms and modeling their proliferation is quite useful to employ an effective and low-cost defense strategy to reduce the rate of their propagation. The topology-aware worms use the information related to
Ahmad Jafarabadi   +1 more
semanticscholar   +4 more sources

An SIR model for the propagation of topology-aware active worms considering the join and leave of hosts

open access: closed2011 7th International Conference on Information Assurance and Security (IAS), 2011
The scanning method of computer worms is an important modeling parameter. Active worms use different methods to scan the network for selecting their victim hosts. Topology-aware active worms scan the network by using the information of the network topology.
Ahmad Jafarabadi   +1 more
semanticscholar   +4 more sources
Some of the next articles are maybe not open access.

Conjunctive join-semilattices

Algebra Universalis, 2020
A join-semilattice L with top is said to be conjunctive if every principal ideal is an intersection of maximal ideals. (This is equivalent to a first-order condition in the language of semilattices.) In this paper, we explore the consequences of the ...
Charles N. Delzell, O. Ighedo, J. Madden
semanticscholar   +1 more source

You Shall Not Join: A Measurement Study of Cryptocurrency Peer-to-Peer Bootstrapping Techniques

Conference on Computer and Communications Security, 2019
Cryptocurrencies are digital assets which depend upon the use of distributed peer-to-peer networks. The method a new peer uses to initially join a peer-to-peer network is known as bootstrapping.
Angelique Faye Loe, Elizabeth A. Quaglia
semanticscholar   +1 more source

IETF 6TiSCH: A Tutorial

IEEE Communications Surveys and Tutorials, 2020
The IETF IPv6 over the TSCH mode of IEEE802.15.4e (6TiSCH) working group has standardized a set of protocols to enable low power industrial-grade IPv6 networks.
Xavier Vilajosana   +5 more
semanticscholar   +1 more source

Monitoring the Impact of the Nodes Density on the MANETs’ Environment

2022 5th International Conference on Engineering Technology and its Applications (IICETA), 2022
MANETs (Mobile Ad-hoc Networks) are self-contained systems that can function without the use of centralized controllers, pre-configured paths/routes, or advanced communication structures.
Ali Hassan Alwan   +8 more
semanticscholar   +1 more source

Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks

ACM/IEEE International Conference on Mobile Computing and Networking, 2001
Benjie Chen   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy