Sciweavers

32 search results - page 5 / 7
» Effective acquaintance management for Collaborative Intrusio...
Sort
View
DISCEX
2003
IEEE
13 years 11 months ago
Detecting Spoofed Packets
Packets sent using the IP protocol include the IP address of the sending host. The recipient directs replies to the sender using this source address. However, the correctness of t...
Steven J. Templeton, Karl E. Levitt
AINA
2009
IEEE
14 years 18 days ago
Quality Aware Context Information Aggregation System for Pervasive Environments
Sensing context information and making it available to the people, involved in coordinating a collaborative task, is a preliminary phase in making a system adaptable to the prevai...
Atif Manzoor, Hong Linh Truong, Schahram Dustdar
TISSEC
2008
202views more  TISSEC 2008»
13 years 5 months ago
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
compromised sensor nodes. The framework provides an appropriate abstraction of applicationspecific detection mechanisms and models the unique properties of sensor networks. Based o...
Qing Zhang, Ting Yu, Peng Ning
ICDE
2005
IEEE
180views Database» more  ICDE 2005»
14 years 7 months ago
A Unified Framework for Monitoring Data Streams in Real Time
Online monitoring of data streams poses a challenge in many data-centric applications, such as telecommunications networks, traffic management, trend-related analysis, webclick st...
Ahmet Bulut, Ambuj K. Singh
WS
2003
ACM
13 years 11 months ago
Secure data transmission in mobile ad hoc networks
The vision of nomadic computing with its ubiquitous access has stimulated much interest in the Mobile Ad Hoc Networking (MANET) technology. However, its proliferation strongly dep...
Panagiotis Papadimitratos, Zygmunt J. Haas