Sciweavers

42 search results - page 8 / 9
» Distributed Exchange of Alerts for the Detection of Coordina...
Sort
View
WPES
2006
ACM
13 years 11 months ago
A privacy-preserving interdomain audit framework
Recent trends in Internet computing have led to the popularization of many forms of virtual organizations. Examples include supply chain management, grid computing, and collaborat...
Adam J. Lee, Parisa Tabriz, Nikita Borisov
ACNS
2011
Springer
241views Cryptology» more  ACNS 2011»
12 years 9 months ago
Misuse Detection in Consent-Based Networks
Consent-based networking, which requires senders to have permission to send traffic, can protect against multiple attacks on the network. Highly dynamic networks like Mobile Ad-hoc...
Mansoor Alicherry, Angelos D. Keromytis
WSDM
2010
ACM
315views Data Mining» more  WSDM 2010»
14 years 3 months ago
SBotMiner: Large Scale Search Bot Detection
In this paper, we study search bot traffic from search engine query logs at a large scale. Although bots that generate search traffic aggressively can be easily detected, a large ...
Fang Yu, Yinglian Xie, Qifa Ke
IPSN
2004
Springer
13 years 11 months ago
Distributed online localization in sensor networks using a moving target
We describe a novel method for node localization in a sensor network where there are a fraction of reference nodes with known locations. For application-specific sensor networks, ...
Aram Galstyan, Bhaskar Krishnamachari, Kristina Le...
DCOSS
2005
Springer
13 years 11 months ago
Collaborative Sensing Using Sensors of Uncoordinated Mobility
Abstract— Wireless sensor networks are useful for monitoring physical parameters and detecting objects or substances in an area. Most ongoing research consider the use of either ...
Kuang-Ching Wang, Parmesh Ramanathan