<rdf:RDF
 xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
 xmlns="http://purl.org/rss/1.0/"
 xmlns:dc="http://purl.org/dc/elements/1.1/"
 xmlns:cc="http://web.resource.org/cc/"
 >
<!--
	This ontology document is licensed under the Creative Commons
	Attribution License. To view a copy of this license, visit
	http://creativecommons.org/licenses/by/2.0/ or send a letter to
	Creative Commons, 559 Nathan Abbott Way, Stanford, California
	94305, USA.
-->
 <channel rdf:about="http://ebiquity.umbc.edu//tags/html/?t=network+topology">
  <cc:license rdf:resource="http://creativecommons.org/licenses/by/2.0/" />
  <title><![CDATA[UMBC ebiquity RSS Tag Search]]></title>
  <link><![CDATA[http://ebiquity.umbc.edu//tags/html/?t=network+topology]]></link>
  <description><![CDATA[UMBC ebiquity RSS Tag Search for network topology]]></description>
  <items>
    <rdf:Seq>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/324/Security-Through-Policy-and-Trust-in-Mobile-Ad-Hoc-Networks"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/110/A-Holistic-Approach-to-Secure-Sensor-Networks"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/546/SAT-an-SVM-based-Automated-Trust-Management-System-for-Mobile-Ad-hoc-Networks"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/459/Policy-based-Malicious-Peer-Detection-in-Ad-Hoc-Networks"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/245/A-Holistic-Approach-to-Secure-Sensor-Networks"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1183/Social-Networks-Applied"/>
    </rdf:Seq>
  </items>
 </channel>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/324/Security-Through-Policy-and-Trust-in-Mobile-Ad-Hoc-Networks">
  <title><![CDATA[Security Through Policy and Trust in Mobile Ad Hoc Networks]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/324/Security-Through-Policy-and-Trust-in-Mobile-Ad-Hoc-Networks</link>
  <description><![CDATA[Abstract:

Mobile ad hoc networks (MANETs) are susceptible to various node misbehaviors due to their unique features, such as highly dynamic network topology, rigorous power constraints and error-prone transmission media.Significant research efforts have been made to address the problem of misbehavior detection as well as trust management for MANETs. However,little research work has been done to distinguish truly malicious behaviors from the faulty behaviors. Both the malicious behaviors an...]]></description>
  <dc:date>2009-11-03</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/110/A-Holistic-Approach-to-Secure-Sensor-Networks">
  <title><![CDATA[A Holistic Approach to Secure Sensor Networks]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/110/A-Holistic-Approach-to-Secure-Sensor-Networks</link>
  <description><![CDATA[Wireless sensor networks (WSNs) form a unique class of ad hoc networks consisting of heterogeneous but highly resource-constrained devices that can sense their environment and report sensed data to designated nodes in the network. We present a holistic approach to improve the performance of wireless sensor networks with respect to security, longevity and connectivity under changing environmental conditions. Our approach is two-fold: We have created a framework for adaptability that detects, c...]]></description>
  <dc:date>2005-07-28</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/546/SAT-an-SVM-based-Automated-Trust-Management-System-for-Mobile-Ad-hoc-Networks">
  <title><![CDATA[SAT: an SVM-based Automated Trust Management System for Mobile Ad-hoc Networks]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/546/SAT-an-SVM-based-Automated-Trust-Management-System-for-Mobile-Ad-hoc-Networks</link>
  <description><![CDATA[Mobile Ad-hoc Networks (MANETs) are extremely vulnerable to a variety of misbehaviors because of their basic features, including a lack of communication infrastructure, short transmission range, and dynamic network topology. To detect and mitigate those misbehaviors, many trust management schemes have been proposed for MANETs. Most rely on pre-defined weights to determine how each apparent misbehavior contributes to an overall measure of trustworthiness. The extremely dynamic nature of MANETs...]]></description>
  <dc:date>2011-11-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/459/Policy-based-Malicious-Peer-Detection-in-Ad-Hoc-Networks">
  <title><![CDATA[Policy-based Malicious Peer Detection in Ad Hoc Networks]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/459/Policy-based-Malicious-Peer-Detection-in-Ad-Hoc-Networks</link>
  <description><![CDATA[Mobile Ad hoc Networks (MANETs) are susceptible to various node misbehaviors due to their unique features, such as highly dynamic network topology, rigorous power constraints and error-prone transmission media. Significant research efforts have been made to address the problem of misbehavior detection.  However, little research work has been done to distinguish truly malicious behaviors from the faulty behaviors. Both the malicious behaviors and the faulty behaviors are generally equally trea...]]></description>
  <dc:date>2009-08-29</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/245/A-Holistic-Approach-to-Secure-Sensor-Networks">
  <title><![CDATA[A Holistic Approach to Secure Sensor Networks]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/245/A-Holistic-Approach-to-Secure-Sensor-Networks</link>
  <description><![CDATA[Wireless sensor networks (WSNs) form a unique class of ad hoc networks
consisting of heterogeneous but highly resource-constrained devices
that can sense their environment and report sensed data to designated
nodes in the network. We present a holistic approach to improve the
performance of wireless sensor networks with respect to security,
longevity and connectivity under changing environmental
conditions. Our approach is two-fold: We have created a framework for
adaptability that det...]]></description>
  <dc:date>2005-08-05</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1183/Social-Networks-Applied">
  <title><![CDATA[Social Networks Applied]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1183/Social-Networks-Applied</link>
  <description><![CDATA[Social networks have interesting properties. They influence our lives enormously without us being aware of the implications they raise. The authors investigate the following areas concerning social networks: how to exploit our unprecedented wealth of data and how we can mine social networks for purposes such as marketing campaigns; social networks as a particular form of influence, i.e.., the way that people agree on terminology and this phenomenon's implications for the way we build ontologi...]]></description>
  <dc:date>2005-01-01</dc:date>
 </item>
</rdf:RDF>
