The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Malicious software poses a great risk to critical infrastructure. Researchers have proposed numerous ways to analyze malware behavior in order to understand and respond to this threat. However, only little attention has been paid to the organization of the malware analysis process itself. In this paper we present the Malware Analysis and Storage System (MASS), a novel framework for malware analysis...
It is known that the accumulated contact data of all stations of multistatic sonar arrays cannot be handled by traditional VHF links. While other technologies like satellite communication systems could handle the amount of data, these systems are usually too costly in terms of money, weight, or power consumption to be deployed on sonar buoys. Therefore, we installed commercial off-the-shelf WLAN with...
Routing in MANETs still is a challenging task. Especially for proactive protocols where nodes periodically send control messages, a vast amount of the available data rate is used for link detection and the dissemination of topology information. Numerous enhancements to existing routing protocols to reduce the overhead caused by control messages have been proposed. Most of them use complex algorithms...
One of the primary application scenarios for mobile wireless multi-hop networks are disaster areas. However, these pose specific challenges for routing, such as mobility and highly unpredictable links. The main applications for disaster area networks - group-based voice communication and group-oriented, map-based tracking - can be realized using multicast groups. Thus, we decided to implement ODMRP...
In typical Mobile Ad-Hoc Network (MANET) applications, the network topology changes frequently due to device movement, or link failure. Consequently, a fast response to connectivity changes is one of the most important challenges in MANETs. Most proactive routing protocols detect changes by exchanging control messages. The Neighborhood Discovery Protocol (NHDP) specifies the exchange of these kind...
Simulation and emulation are techniques frequently used for performance evaluation of wireless multi-hop networks. If the wireless devices are mobile, the movement patterns of these objects are found to have significant impact on the simulation and emulation results. This is obvious as the movements influence the topology of the network. In this paper, we focus on the sound performance evaluation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.