In a distributed cloud, it is crucial to detect and eliminate faulty network entities in order to protect network assets and mitigate the risks associated with constantly arising attacks. Much research has been conducted on locating a single static black hole, which is defined as a network site whose existence is known a priori and that disposes of any incoming data without leaving any trace of this occurrence. In this paper, we introduce a specific attack model that involves multiple faulty nodes that can be repaired by mobile software agents, as well as what we call a gray virus that can infect a previously repaired faulty node and turn it into a black hole. The Faulty Node Repair and Dynamically Spawned Black Hole Search (FNR-DSBHS) prob...
We study a group of mobile agents operating on an arbitrary unknown distributed system. One of the n...
Abstract. Consider a team of (one or more) mobile agents operating in a graph G. Unaware of the grap...
Abstract. The exploration problem has been extensively studied in un-safe networks containing malici...
The reality of the constant emergence of new threats justifies the necessity to protect network asse...
As the size and use of networks continue to increase, network anomalies and faults are commonplace. ...
We study the problem of locating a particularly dangerous node, the so-called black hole in a synchr...
Anomalies and faults are inevitable in computer networks, today more than ever before. This is due t...
A black hole is a highly harmful host that disposes of visiting agents upon their arrival. It is kno...
Abstract. We study the problem of locating a particularly dangerous node, the so-called black hole i...
We study the problem of locating a particularly dangerous node, the so-called black hole in a synchr...
In this paper, we start the investigation of distributed computing by mobile agents in dangerous dyn...
We study the problem of locating a particularly dangerous node, the so-called black hole in a synchr...
International audienceWe study the problem of locating a particularly dangerous node, the so-called ...
A black hole in a network is a highly harmful host that disposes of any incoming agents upon their a...
The exploration problem has been extensively studied in unsafe networks containing malicious hosts o...
We study a group of mobile agents operating on an arbitrary unknown distributed system. One of the n...
Abstract. Consider a team of (one or more) mobile agents operating in a graph G. Unaware of the grap...
Abstract. The exploration problem has been extensively studied in un-safe networks containing malici...
The reality of the constant emergence of new threats justifies the necessity to protect network asse...
As the size and use of networks continue to increase, network anomalies and faults are commonplace. ...
We study the problem of locating a particularly dangerous node, the so-called black hole in a synchr...
Anomalies and faults are inevitable in computer networks, today more than ever before. This is due t...
A black hole is a highly harmful host that disposes of visiting agents upon their arrival. It is kno...
Abstract. We study the problem of locating a particularly dangerous node, the so-called black hole i...
We study the problem of locating a particularly dangerous node, the so-called black hole in a synchr...
In this paper, we start the investigation of distributed computing by mobile agents in dangerous dyn...
We study the problem of locating a particularly dangerous node, the so-called black hole in a synchr...
International audienceWe study the problem of locating a particularly dangerous node, the so-called ...
A black hole in a network is a highly harmful host that disposes of any incoming agents upon their a...
The exploration problem has been extensively studied in unsafe networks containing malicious hosts o...
We study a group of mobile agents operating on an arbitrary unknown distributed system. One of the n...
Abstract. Consider a team of (one or more) mobile agents operating in a graph G. Unaware of the grap...
Abstract. The exploration problem has been extensively studied in un-safe networks containing malici...