LH * RSP 2 P : a fast and high churn resistant scalable distributed data structure for P2P systems
LH*<SUB align=right>RS<SUP align=right>P2P</SUP> is a new scalable distributed data structure (SDDS) for P2P applications. It deals with two major issues in P2P systems. One is efficient location of the peers with searched data ...
A novel approach against the system buffer overflow
The system buffer overflow (SBO) is a universal problem in information security. In the traditional defence mechanisms, the SBO prevents shell code execution and neglect unsuccessful attack that makes system procedures terminate abnormally. In this ...
Forty years of movie hacking: considering the potential implications of the popular media representation of computer hackers from 1968 to 2008
Increasingly movies are being produced which feature plots that incorporate elements of computer security and hacking, and cumulatively these movies are creating a public perception as to the nature of computer security. This research examines movies ...
Malicious node detection system in wireless sensor networks: a decentralised approach
The large deployment of wireless sensor networks (WSNs) increases their exposure to intrusions on sensor nodes. One of the most challenging issues is how to detect compromised or malicious nodes. Our goal in this paper is to review different techniques ...
Security of internet-connected computer networks
The security of computer networks connected to the internet is an important, vital and hotly contested real-world issue. Once the computer networks get connected to the internet, the number of attacks, their strength and intensity grow exponentially. ...
A lightweight secure architecture for wireless sensor networks
The adoption and widespread deployment of wireless sensor networks means that security issues are of critical concern. To date, much research has focused on the usability of these networks in a variety of environments where conventional wired networks ...
Improving TCP performance over mobile ad hoc networks
The transmission control protocol (TCP) was designed to provide reliable end-to-end delivery of data over unreliable networks. Most TCP implementations have been carefully optimised to operate in wired networks. Deploying standard TCP in wireless mobile ...
Providing location privacy in pervasive computing through a hybrid mechanism
Advances in pervasive computing technology on the one hand, and the widespread use of mobile computing devices combined with improvements in embedded positioning capabilities on the other hand, testify the need for new mechanisms and applications to ...
Trust algorithms in P2P file sharing networks
Many peer to peer (P2P) networks are used to share different types of files between users who are usually anonymous. To prevent the distribution of files that have been intentionally damaged, filled with false content or infected with malware, users ...