Posts

Showing posts from 2011

Most Beautiful Arab Girls

Image
شركت كنندگان ملكه زيبايي فلسطين

Three apples change the world

Image
Three apples change the world

Student Branch of C4I

Student Branch of Command, Control, Communications, Computers and Intelligence Activities Members Links SBC4I Table of Contents Contact doc/constitution.pdf doc/form.pdf image/sbc4i.jpg شاخه دانشجویی انجمن علمی فرماندهی و کنترل ایران در دانشگاه صنعتی شریف Student Branch of of Command, Control, Communications, Computers and Intelligence at Sharif University of Technology

Best Golf Bags For Sale

Image
golf bag golf bags best golf bags golf bag for sale golf bag off golf bag off for slae best golf bags off for sale This Week Only: FREE Shipping To Mainland USA & NO US Sales Tax on All Golf Bags For Sale! Golf Cart Bags Golf Stand Bags Golf Staff Bags Specials for May Callaway X-22 Stand Bag List Price: $208.35 Sale Price: $159.99   Buy Now       TaylorMade Pure-Lite 2.0 Stand Bag List Price: $201.62 Sale Price: $159.99   Buy Now       Callaway Org.14 Xtreme Cart Bag List Price: $195.46 Sale Price: $149.99   Buy Now       Looking for the   best golf bags for sale   online? Then you've come to the right golf store. We carry a wide selection of stand, cart, and staff bags, from major brand names including   Callaway   and   TaylorMade . At Golf Bag Center you can be sure to find the best golf bags to protect your clubs and gear, while giving you the best price on the Internet. A quality bag may not directly improve your game, but it can definit

Security Improvement of Ad-hoc Networks Routing Protocol

Security Improvement of Ad-hoc Networks Routing Protocol ارتقاء امنیت پروتکل های مسیریابی در شبکه های اقتضایی

Game-theoretic approach to mitigate packet dropping in wireless Ad-hoc networks

Image
Game-theoretic approach to mitigate packet dropping in wireless Ad-hoc networks Tootaghaj , Diman Zad   ;   Farhat, Farshid   ;   Pakravan, Mohammad-Reza   ;   Aref, Mohammad-Reza   ;   Information Systems and Security Lab (ISSL), Department of Electrical Engineering, Sharif University of Technology, Tehran, Iran This paper appears in:     Consumer Communications and Networking Conference (CCNC), 2011 IEEE   Issue Date :    9-12 Jan. 2011   On page(s):  163   Print ISBN:  978-1-4244-8789-9   Digital Object Identifier :     10.1109/CCNC.2011.5766444   Date of Current Version :     12 May 2011 ABSTRACT Performance of routing is severely degraded when misbehaving nodes drop packets instead of properly forwarding them. In this paper, we propose a Game-Theoretic Adaptive Multipath Routing (GTAMR) protocol to detect and punish selfish or malicious nodes which try to drop information packets in routing phase and defend against collaborative attacks in which nodes try to disrupt c

Risk of attack coefficient effect on availability of Ad-hoc networks

Image
Risk of attack coefficient effect on availability of Ad-hoc networks Tootaghaj , Diman Zad   ;   Farhat, Farshid   ;   Pakravan, Mohammad-Reza   ;   Aref, Mohammad-Reza   ;   Information Systems and Security Lab (ISSL), Department of Electrical Engineering, Sharif University of Technology, Tehran, Iran This paper appears in:     Consumer Communications and Networking Conference (CCNC), 2011 IEEE   Issue Date :    9-12 Jan. 2011   On page(s):  166   Print ISBN:  978-1-4244-8789-9   Digital Object Identifier :     10.1109/CCNC.2011.5766445   Date of Current Version :     12 May 2011 ABSTRACT Security techniques have been designed to obtain certain objectives. One of the most important objectives all security mechanisms try to achieve is the availability, which insures that network services are available to various entities in the network when required. But there has not been any certain parameter to measure this objective in network. In this paper we consider availability as

Game-Theoretic Approach in Network Security, Availability and Privacy

Image
Game-Theoretic Network Simulator   This is GTNS: game theoretic network simulator help document. In order to download GTNS click it. To download samples click it! Introduction: GTNS is a discrete-event network simulator targeted primarily for research and educational use. GTNS is written in Visual C++ programming language and supports different network topologies. This simulator was first produced to implement locally multipath adaptive routing (LMAR) protocol, classified as a new reactive distance vector routing protocol for MANETs. LMAR can find an ad-hoc path without selfish nodes and wormholes using an exhaustive search algorithm in polynomial time. Also when the primary path fails, it discovers an alternative safe path if network graph remains connected after eliminating selfish/malicious nodes. The key feature of LMAR to seek safe route free of selfish and malicious nodes in polynomial time is its searching algorithm and flooding stage that its generated traffic is equi-

Information Systems and Security Lab

Information Systems and Security Lab Home People Groups Publications papers/ghabeli/Commletter.pdf papers/ghabeli/IET1.pdf papers/ghabeli/IET2.pdf papers/salimi/IET1.pdf papers/salimi/IET2.pdf papers/yassae/Yasaee Slepian-Wolf Coding Over Cooperative Relay Networks.pdf papers/akhbari/IET_5494868.pdf papers/akhbari/ITW09.pdf papers/farhat papers/farhat/lmar.pdf papers/farhat/1569353017.pdf papers/farhat/1569353021.pdf Links Contents Contact

Security Publications

Towards blind detection of low-rate spatial embedding in image steganalysis Modeling and Optimization of Straggling Mappers Performance Modeling and Optimization of MapReduce Security Weaknesses in PGP Protocol Eigenvalues-based LSB steganalysis Image steganalysis based on SVD and noise estimation: Improve sensitivity to spatial LSB embedding families Multi-dimensional correlation steganalysis Game-theoretic approach to mitigate packet dropping in wireless ad-hoc networks Risk of attack coefficient effect on availability of adhoc networks Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup (PIAKAP) Locally Multi-path Adaptive Routing Protocol Resilient to Selfishness and Wormholes Extended Authentication and Key Agreement Protocol of UMTS

Mobile Ad-hoc Network (MANET) Simulator based on Efficient Local-Multipath Adaptive Routing (ELMAR) Protocol

Image
شبیه ساز شبکه اقتضایی بر مبنای پروتکل مسیریابی وفقی چندمسیره محلی بهینه Mobile Ad-hoc Network (MANET) Simulator based on Efficient Local-Multipath Adaptive Routing (ELMAR) Protocol شبيه ساز   MANET 1             مقدمه در اين بخش شبيه ساز   MANET   که   براي شبيه سازي پروتکل پيشنهادي   SELMAR   طراحي شده است، معرف ي   مي   شود. در بخش هاي بعدي نحوه کارکرد شبيه ساز بيان مي شود و برخي از کلاس ها، متغيرها و توابع مهم شبيه ساز توضيح داده مي شود و در نهايت نتايج شبيه سازي پروتکل SELMAR   با توجه به خودخواهي و حمله لانه کرمي بررسي مي شود. شبيه ساز   MANET   براي شبيه سازي پروتکل هاي شبکه هاي اقتضايي پياده سازي شده است، و خصوصا براي آناليز عملکرد پروتکل   SELMAR   مورد استفاده قرار می گیرد. شبيه ساز   MANET   با زبان برنامه نويسي   Visual C++   نوشته شده است که تحت سيستم عامل   Windows   کار مي کند. 2             نحوه کارکرد شبيه ساز به منظور شبيه سازي يک شبکه اقتضايي ابتدا اجزاي آن که شامل مسيرياب ها، لينک ها و ترافيک ها است، بايستي مشخص شوند. مسيرياب ها مطابق توپولوژي مورد نظر مي تو