Sciweavers

23 search results - page 5 / 5
» Distributed Software-based Attestation for Node Compromise D...
Sort
View
ACSAC
2007
IEEE
13 years 11 months ago
Countering False Accusations and Collusion in the Detection of In-Band Wormholes
Cooperative intrusion detection techniques for MANETs utilize ordinary computing hosts as network intrusion sensors. If compromised, these hosts may inject bogus data into the int...
Daniel Sterne, Geoffrey Lawler, Richard Gopaul, Br...
ISPAN
2005
IEEE
13 years 10 months ago
Safety and QoS-Aware Management of Heterogeneous Sensor Networks
— Recently, we have proposed ANSWER: AutoNomouS Wireless sEnsor netwoRk as a service platform whose mission is to provide dependable information services to in-situ mobile users ...
Mohamed F. Younis, Waleed A. Youssef, Mohamed Elto...
SASN
2006
ACM
13 years 10 months ago
Attacker traceback with cross-layer monitoring in wireless multi-hop networks
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to its limited network/host resources. Attacker traceback is a promi...
Yongjin Kim, Ahmed Helmy