Skip to main content

Research Repository

Advanced Search

Outputs (14)

Policing The Cyber Threat: Exploring the Threat from Cyber Crime and the Ability of Local Law Enforcement to Respond (2018)
Presentation / Conference Contribution

The landscape in which UK policing operates today is a dynamic one, and growing threats such as the proliferation of cyber crime are increasing the demand on police resources. The response to cyber crime by national and regional law enforcement agenc... Read More about Policing The Cyber Threat: Exploring the Threat from Cyber Crime and the Ability of Local Law Enforcement to Respond.

Looping in OLSRv2 in Mobile Ad-Hoc Networks, Loop Suppession and Loop Correction (2009)
Journal Article
Speakman, L., Owada, Y., & Mase, K. (2009). Looping in OLSRv2 in Mobile Ad-Hoc Networks, Loop Suppession and Loop Correction. IEICE Transactions on Communications, E92-B(4), 1210-1221. https://doi.org/10.1587/transcom.e92.b.1210

Transient routing loops have been observed to form in Mobile Ad-hoc Networks running the OLSRv2 proactive link-state routing protocol. The packets falling into loops impact the surrounding network thus degrading throughput even though only a small pr... Read More about Looping in OLSRv2 in Mobile Ad-Hoc Networks, Loop Suppession and Loop Correction.

An analysis of loop formation in OLSRv2 in ad-hoc networks and limiting its negative impact (2008)
Presentation / Conference Contribution

Transient routing loops have been observed to form in Ad-hoc Networks running the OLSRv2 routing protocol. The looping traffic significantly increases the impact on the surrounding network and its traffic thus degrading end-to-end transmission by a s... Read More about An analysis of loop formation in OLSRv2 in ad-hoc networks and limiting its negative impact.