Skip to main content

Research Repository

Advanced Search

The VoIP intrusion detection through a LVQ-based neural network. (2009)
Presentation / Conference Contribution
Zheng, L., & Peng, T. (2009, November). The VoIP intrusion detection through a LVQ-based neural network. Paper presented at The 4th International Conference for Internet Technology and Secured Transactions

Being a fast-growing Internet application, Voice over Internet Protocol shares the network resources with the regular Internet traffic. However it is susceptible to the existing security holes of the Internet. In this paper, a highly effective VoIP i... Read More about The VoIP intrusion detection through a LVQ-based neural network..

FH-MAC: A Multi-Channel Hybrid MAC Protocol for Wireless Mesh Networks (2009)
Journal Article
Tandjaoui, D., Doudou, M., & Romdhani, I. (2009). FH-MAC: A Multi-Channel Hybrid MAC Protocol for Wireless Mesh Networks. International Journal of Grid and High Performance Computing, 1(4), 40-56. https://doi.org/10.4018/jghpc.2009070804

In this article, the authors propose a new hybrid MAC protocol named H-MAC for wireless mesh networks. This protocol combines CSMA and TDMA schemes according to the contention level. In addition, it exploits channel diversity and provides a medium ac... Read More about FH-MAC: A Multi-Channel Hybrid MAC Protocol for Wireless Mesh Networks.

Protecting mobile agents from external replay attacks (2009)
Journal Article
Garrigues, C., Migas, N., Buchanan, W., Robles, S., & Borrell, J. (2009). Protecting mobile agents from external replay attacks. Journal of Systems and Software, 82(2), 197-206. https://doi.org/10.1016/j.jss.2008.05.018

This paper presents a protocol for the protection of mobile agents against external replay attacks. This kind of attacks are performed by malicious platforms when dispatching an agent multiple times to a remote host, thus making it reexecute part of... Read More about Protecting mobile agents from external replay attacks.