Sort by: Order: Results:

Now showing items 1-10 of 10

  • Analysing the security threats against network convergence architectures 

    ARGYROUDIS, PATROKLOS; DOYLE, LINDA; O'MAHONY, DONAL EDWARD (IEEE Computer Society Press, 2007)
    Current research trends in networks and telecommunications suggest that future architectures will aim for the convergence not only of fixed and mobile infrastructures, but also of different network layer technologies. ...
  • Architectures for person to person communications in disaggregated networks 

    ARGYROUDIS, PATROKLOS; DOYLE, LINDA; O'MAHONY, DONAL EDWARD (IEEE, 2006)
    Current telecommunications systems allocate identifiers to devices, and end-points. While this has worked well thus far, we believe that as more devices are used to access these systems, people have a tendency to be mobile ...
  • Grouping abstraction and authority control in policy-based spectrum management 

    ARGYROUDIS, PATROKLOS; FEENEY, KEVIN; LEWIS, DAVID; NOLAN, KEITH EDWARD; O'SULLIVAN, DECLAN (IEEE, 2007)
    The management of dynamic spectrum access requires the coordination of administrative functions across multiple organizations, from regulators to secondary market operators and commons cooperatives. Policy-based management ...
  • A policy-driven trading framework for market-based spectrum assignment 

    ARGYROUDIS, PATROKLOS; DOYLE, LINDA; FORDE, TIM; O'MAHONY, DONAL EDWARD (IEEE, 2007)
    We present a policy-driven trading framework for market-based spectrum assignment. Our work allows spectrum consumers to get exclusive access rights through payment of a fee, for a given period of time, and for a given ...
  • PR3 Email Honeypot 

    ARGYROUDIS, PATROKLOS (2003)
    Although there are different tools and technologies available to prevent attacks on privacy when online applications are used, few tools are available for detection of actions that violate privacy agreements. The loss ...
  • Real-time Intrusion Detection for Ad hoc Networks 

    ARGYROUDIS, PATROKLOS; TEWARI, HITESH (IEEE, 2005)
    A mobile ad hoc network is a collection of nodes that are connected through a wireless medium and form rapidly changing topologies. The widely accepted existing routing protocols designed to accommodate the needs of such ...
  • Secure routing for mobile ad-hoc networks 

    ARGYROUDIS, PATROKLOS; O'MAHONY, DONAL EDWARD (IEEE, 2005)
    In this article we present a survey of secure ad hoc routing protocols for mobile wireless networks. A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing ...
  • Towards a context-aware framework for pervasive computing authorization management 

    ARGYROUDIS, PATROKLOS; O'MAHONY, DONAL EDWARD (2005)
    Pervasive computing environments have by definition three main inherent properties; extremely open and dynamic nature, suggesting large number of interactions among previously unknown entities, the ability to adapt ...
  • Towards flexible authorization management 

    ARGYROUDIS, PATROKLOS; O'MAHONY, DONAL EDWARD (IEEE, 2005)
    During the last years there have been a lot of proposals in the literature for systems that attempt to manage the process of trust establishment. However, the engineering details related to the exchange and negotiation of ...
  • Twohop: Metric-based trust evaluation for peer-to-peer collaboration environments 

    ARGYROUDIS, PATROKLOS; O'MAHONY, DONAL EDWARD (IEEE, 2008)
    Communications are increasingly relying on peer-to-peer models of interaction in which all participating entities have the same level of authority. Such models allow developed systems to overcome single points of failure, ...