International Conference on Networking, International Conference on Systems and International Conference on Mobile Communicatio
DOI: 10.1109/icniconsmcl.2006.154
|View full text |Cite
|
Sign up to set email alerts
|

Network Layer Solutions forWireless Shadow Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…As network firewalls and security updates have become more common, network boundaries have become more secure. For this reason computer security hackers and crackers have moved their attention from the Network Layer [5] to the Application Layer [5], focusing on the websites themselves. Over seventy percent of attacks now occur at the application layer [6] and research by WhiteHat Security has found eight in ten websites have serious vulnerabilities [6].…”
Section: Background To the Problemmentioning
confidence: 99%
“…As network firewalls and security updates have become more common, network boundaries have become more secure. For this reason computer security hackers and crackers have moved their attention from the Network Layer [5] to the Application Layer [5], focusing on the websites themselves. Over seventy percent of attacks now occur at the application layer [6] and research by WhiteHat Security has found eight in ten websites have serious vulnerabilities [6].…”
Section: Background To the Problemmentioning
confidence: 99%
“…In [5,10], emergency networks based on mounted antennas (BS) either on vehicles or on top of nondestroyed buildings to provide communications, are presented. In [11][12], MAC layer protocols for mobile ad hoc networks are discussed for emergency situations.…”
Section: Related Workmentioning
confidence: 99%