Survivability is usually defined as the capability of a network to deliver data successfully in a timely manner, even in the presence of attacks. Security as well as reliability are included in survivability considerations. Due to the lossy and open nature of wireless links, design of solutions to make the network survive against attacks as well as wireless idiosyncrasies is difficult. In this dissertation, we approach several issues that have to be considered in order to ensure survivability in various contexts. Firstly, we need to understand the causes for why the network is failing or does not deliver data efficiently as supposed. Network forensics could help with this matter. However, provisioning forensic evidence could impact the netw...
Wireless communications has been accepted by many organizations and users asit allows to be flexible...
Cybersecurity has become an increasingly important concern for both military and civilian infrastruc...
A major challenge in securing wireless applications and services is the inherent vulnerability of ra...
Transmission Evidence (TE for short) refers to a historic trail of the transmissions that occur in t...
There are trade-offs between security, reliability and performance. In this dissertation, we conside...
Due to the lossy nature of wireless links, it is difficult to determine if packet losses are due to ...
In the past 10 years there has been an explosion of unprecedented growth in wireless based technolog...
Transmission Evidence (TE for short) refers to a historic trail of the packet transmissions in the n...
Due to the lossy nature of wireless links, it is difficult to determine if packet losses are due to ...
Wireless networks are deployed in many critical areas, such as health care centers, hospitals, polic...
Wireless networks are continuing to grow around the world due to the advantages it offers and all th...
With the rapid evolvement of information science, data-oriented research has solicited a new philoso...
Abstract—Network survivability is the ability of a network keeping connected under failures and atta...
Wireless network access protocols are used in numerous safety critical applications. Network availab...
The wireless self-organizing network under attack was considered. The aim was to organize “a ...
Wireless communications has been accepted by many organizations and users asit allows to be flexible...
Cybersecurity has become an increasingly important concern for both military and civilian infrastruc...
A major challenge in securing wireless applications and services is the inherent vulnerability of ra...
Transmission Evidence (TE for short) refers to a historic trail of the transmissions that occur in t...
There are trade-offs between security, reliability and performance. In this dissertation, we conside...
Due to the lossy nature of wireless links, it is difficult to determine if packet losses are due to ...
In the past 10 years there has been an explosion of unprecedented growth in wireless based technolog...
Transmission Evidence (TE for short) refers to a historic trail of the packet transmissions in the n...
Due to the lossy nature of wireless links, it is difficult to determine if packet losses are due to ...
Wireless networks are deployed in many critical areas, such as health care centers, hospitals, polic...
Wireless networks are continuing to grow around the world due to the advantages it offers and all th...
With the rapid evolvement of information science, data-oriented research has solicited a new philoso...
Abstract—Network survivability is the ability of a network keeping connected under failures and atta...
Wireless network access protocols are used in numerous safety critical applications. Network availab...
The wireless self-organizing network under attack was considered. The aim was to organize “a ...
Wireless communications has been accepted by many organizations and users asit allows to be flexible...
Cybersecurity has become an increasingly important concern for both military and civilian infrastruc...
A major challenge in securing wireless applications and services is the inherent vulnerability of ra...