SearchSkip to Search Results
- 2Delay tolerant network
- 1Communication networks
- 1Malicious executables
- 1Mobile networks
Delay Tolerant Mobile Networks (DTMNs) provide communication despite the occasional presence of disconnected subnetworks. They rely on finding a set of sequential opportunistic encounters between pairs of mobile nodes. In this context, understanding mobile node behaviour is essential to design...
Mobile objects can be equipped with sensors enabling them to collect data, as well as answer queries remotely and in real-time. For that, one needs to be able to effectively route queries from a base station to the queried object in an efficient way, i.e., with minimum energy-cost and/or minimum...
In this thesis, we propose a novel approach to detect malicious executables in the network layer using a combination of techniques from bioinformatics, data mining and information retrieval. This approach requires translating malicious code into genome-like representations. Based on their...