Anomalies and faults are inevitable in computer networks, today more than ever before. This is due to the large scale and dynamic nature of the networks used to process big data and to the ever-increasing number of ad-hoc devices. Beyond natural faults and anomalies occurring in a network, threats proceeding from attacks conducted by malicious intruders must be considered. Consequently, there is often a need to quickly isolate and even repair a fault in a network when it appears. Furthermore, despite the presence in a network of faults stemming from malicious entities, we need to identify the latter and their behaviours, and develop protocols resilient to their attacks. Thus, defining models to capture the dangers inherent to various faults...
A mobile ad hoc network (MANET) is a frameworkless system of different mobile devices known for its ...
This thesis addresses three detection and diagnosis problems for systems with event-driven dynamics....
A group of identical mobile agents moving asynchronously among the nodes of an anonymous network hav...
As the size and use of networks continue to increase, network anomalies and faults are commonplace. ...
In a distributed cloud, it is crucial to detect and eliminate faulty network entities in order to pr...
The reality of the constant emergence of new threats justifies the necessity to protect network asse...
This thesis deals with the problems of exploration and map construction of a dangerous network by m...
Abstract. The exploration problem has been extensively studied in un-safe networks containing malici...
AbstractWe consider a fixed, undirected, known network and a number of “mobile agents” which can tra...
Abstract:- This paper describes an effort to provide a holistic view of network conversation exchang...
A challenging aspect in open ad hoc networks is their resilience against malicious agents. This is e...
Abstract—The context of this work is the online characteriza-tion of errors in large scale systems. ...
Given the complexity, size, cost, and importance of network infrastructures like the internet, telec...
The exploration problem has been extensively studied in unsafe networks containing malicious hosts o...
Recent IoT proliferation has undeniably affected the way organizational activities and business proc...
A mobile ad hoc network (MANET) is a frameworkless system of different mobile devices known for its ...
This thesis addresses three detection and diagnosis problems for systems with event-driven dynamics....
A group of identical mobile agents moving asynchronously among the nodes of an anonymous network hav...
As the size and use of networks continue to increase, network anomalies and faults are commonplace. ...
In a distributed cloud, it is crucial to detect and eliminate faulty network entities in order to pr...
The reality of the constant emergence of new threats justifies the necessity to protect network asse...
This thesis deals with the problems of exploration and map construction of a dangerous network by m...
Abstract. The exploration problem has been extensively studied in un-safe networks containing malici...
AbstractWe consider a fixed, undirected, known network and a number of “mobile agents” which can tra...
Abstract:- This paper describes an effort to provide a holistic view of network conversation exchang...
A challenging aspect in open ad hoc networks is their resilience against malicious agents. This is e...
Abstract—The context of this work is the online characteriza-tion of errors in large scale systems. ...
Given the complexity, size, cost, and importance of network infrastructures like the internet, telec...
The exploration problem has been extensively studied in unsafe networks containing malicious hosts o...
Recent IoT proliferation has undeniably affected the way organizational activities and business proc...
A mobile ad hoc network (MANET) is a frameworkless system of different mobile devices known for its ...
This thesis addresses three detection and diagnosis problems for systems with event-driven dynamics....
A group of identical mobile agents moving asynchronously among the nodes of an anonymous network hav...