by NS2 Simulator Project Team | Oct 13, 2015 | Projects on Network Security
WiFi has become the de facto wireless technology for achieving short to medium-range device connectivity. While early attempts to secure this technology have been proved inadequate in several respects, the current, more robust, security amendments will inevitably get... by NS2 Simulator Project Team | Oct 13, 2015 | Projects on Network Security
Sensor networks are widely used in various domains like the intelligent transportation systems. Users issue queries to sensors and collect sensing data. Due to the low quality sensing devices or random link failures, sensor data are often noisy. In order to increase... by NS2 Simulator Project Team | Oct 13, 2015 | Projects on Network Security
Security corporations and researchers usually employ fuzzing techniques to find hiding bugs of programs. They collect millions of sample files to test target programs with mutating samples’ byte randomly. However, it wastes lots of time and computation resources... by NS2 Simulator Project Team | Oct 13, 2015 | Projects on Network Security
The transformation of belief function into probability is one of the most important and common ways for decision making under the framework of evidence theory. In this paper, we focus on the evaluation of such probability transformations (PTs), which are crucial for... by NS2 Simulator Project Team | Oct 13, 2015 | Projects on Network Security
A normalized cyclic convolution is a cyclic convolution when one of its factors is a fixed polynomial. Herein, a novel method for constructing a normalized cyclic convolution over a finite field is introduced. This novel method is the first constructive and best known...