University of Brescia

Displaying 1-8 of 8 results

  • White Papers // Jul 2014

    Wireless Sensor Networks Attacks and Solutions

    A few years ago, Wireless Sensor Networks (WSNs) used by only military. Now-a-days, the people have seen many of organizations use WSNs for some purposes such as weather, pollution, traffic control, and healthcare. Security is becoming on these days a major concern for wireless sensor network. In this paper, the...

    Provided By University of Brescia

  • White Papers // Jan 2014

    Efficient SOPC-Based Multicore System Design Using NOC

    Due to the advancement of VLSI (Very Large Scale Integrated Circuits) technologies, the authors can put more cores on a chip, resulting in the emergence of a multicore embedded system. This also brings great challenges to the traditional parallel processing as to how they can improve the performance of the...

    Provided By University of Brescia

  • White Papers // Jul 2012

    Multi-Frame Signature-Cum Anomaly-Based Intrusion Detection Systems (MSAIDS) to Protect Privacy of Users Over Mobile Collaborative Learning (MCL)

    The rogue DHCP is unauthorized server that releases the incorrect IP address to users and sniffs the traffic illegally. The contribution specially provides privacy to users and enhances the security aspects of Mobile Supported Collaborative Framework (MSCF) explained .The paper introduces Multi-frame Signaturecum Anomaly-Based Intrusion Detection Systems (MSAIDS) supported with...

    Provided By University of Brescia

  • White Papers // Jul 2012

    Cloud Computing: The Future of IT Industry

    As a result of the research processing in the computing field, a new computing model appeared based on the development of many computing models such as parallel computing, distributed computing, and grid computing. Many normal distributed computers collaborate of achieve a function like a super computer. The computation will be...

    Provided By University of Brescia

  • White Papers // Jul 2012

    Performance Evaluation of AODV and DSR Routing Protocols in MANET Networks

    Extensive use of wireless networks in different fields increases the need to improve their performance, as well as minimize the amplitude of loss messages. Device mobility, where there is no standard topology that can be applied or fixed routing that can be designed, is a topic that received recent attention...

    Provided By University of Brescia

  • White Papers // Jul 2012

    Performance Evaluation of DYMO, AODV and DSR Routing Protocols in MANET

    An Ad Hoc network has no infrastructure and it provides flexibility to network's nodes to connect and disconnect at any time. A MANET is an Ad Hoc network that provides freedom of movement to the network's nodes. In a MANET, The development of routing protocols is one of the main...

    Provided By University of Brescia

  • White Papers // Jul 2012

    TCP-UB: A New Congestion Aware Transmission Control Protocolvariant

    Transmission Control Protocol (TCP) is a connection oriented protocol for several types of distributed applications. TCP is reliable particularly for traditional fixed networks. With emergence of faster wireless networks, TCP has been performing poorly in its original format. The performance of TCP is affected due to assorted factors including congestion...

    Provided By University of Brescia

  • White Papers // Feb 2009

    Embedded Forensics: An Ongoing Research About SIM/USIM Cards

    This paper is aimed at providing an introduction into the field of embedded forensics, or Small Scale Digital Device Forensics (SSDDF) and ongoing research in this field. Embedded forensics encompasses a range of practices and methodologies on such platforms that can be used in digital forensics investigation. This paper introduces...

    Provided By University of Brescia

  • White Papers // Jul 2012

    Cloud Computing: The Future of IT Industry

    As a result of the research processing in the computing field, a new computing model appeared based on the development of many computing models such as parallel computing, distributed computing, and grid computing. Many normal distributed computers collaborate of achieve a function like a super computer. The computation will be...

    Provided By University of Brescia

  • White Papers // Jul 2012

    Performance Evaluation of AODV and DSR Routing Protocols in MANET Networks

    Extensive use of wireless networks in different fields increases the need to improve their performance, as well as minimize the amplitude of loss messages. Device mobility, where there is no standard topology that can be applied or fixed routing that can be designed, is a topic that received recent attention...

    Provided By University of Brescia

  • White Papers // Jul 2012

    Performance Evaluation of DYMO, AODV and DSR Routing Protocols in MANET

    An Ad Hoc network has no infrastructure and it provides flexibility to network's nodes to connect and disconnect at any time. A MANET is an Ad Hoc network that provides freedom of movement to the network's nodes. In a MANET, The development of routing protocols is one of the main...

    Provided By University of Brescia

  • White Papers // Feb 2009

    Embedded Forensics: An Ongoing Research About SIM/USIM Cards

    This paper is aimed at providing an introduction into the field of embedded forensics, or Small Scale Digital Device Forensics (SSDDF) and ongoing research in this field. Embedded forensics encompasses a range of practices and methodologies on such platforms that can be used in digital forensics investigation. This paper introduces...

    Provided By University of Brescia

  • White Papers // Jul 2012

    Multi-Frame Signature-Cum Anomaly-Based Intrusion Detection Systems (MSAIDS) to Protect Privacy of Users Over Mobile Collaborative Learning (MCL)

    The rogue DHCP is unauthorized server that releases the incorrect IP address to users and sniffs the traffic illegally. The contribution specially provides privacy to users and enhances the security aspects of Mobile Supported Collaborative Framework (MSCF) explained .The paper introduces Multi-frame Signaturecum Anomaly-Based Intrusion Detection Systems (MSAIDS) supported with...

    Provided By University of Brescia

  • White Papers // Jul 2012

    TCP-UB: A New Congestion Aware Transmission Control Protocolvariant

    Transmission Control Protocol (TCP) is a connection oriented protocol for several types of distributed applications. TCP is reliable particularly for traditional fixed networks. With emergence of faster wireless networks, TCP has been performing poorly in its original format. The performance of TCP is affected due to assorted factors including congestion...

    Provided By University of Brescia

  • White Papers // Jan 2014

    Efficient SOPC-Based Multicore System Design Using NOC

    Due to the advancement of VLSI (Very Large Scale Integrated Circuits) technologies, the authors can put more cores on a chip, resulting in the emergence of a multicore embedded system. This also brings great challenges to the traditional parallel processing as to how they can improve the performance of the...

    Provided By University of Brescia

  • White Papers // Jul 2014

    Wireless Sensor Networks Attacks and Solutions

    A few years ago, Wireless Sensor Networks (WSNs) used by only military. Now-a-days, the people have seen many of organizations use WSNs for some purposes such as weather, pollution, traffic control, and healthcare. Security is becoming on these days a major concern for wireless sensor network. In this paper, the...

    Provided By University of Brescia