Sciweavers

235 search results - page 46 / 47
» Secure Routing and Intrusion Detection in Ad Hoc Networks
Sort
View
FGCN
2008
IEEE
144views Communications» more  FGCN 2008»
14 years 2 hour ago
A Novel Approach for Infrastructure Deployment for VANET
In last decade intelligent transportation systems (ITS) and vehicular ad hoc network (VANET) became one of the most active and emerging fields of research. It is expected that thi...
Une Thoing Rosi, Chowdhury Sayeed Hyder, Tai-hoon ...
IMC
2009
ACM
14 years 1 days ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
OPODIS
2010
13 years 3 months ago
Self-stabilizing (k, r)-Clustering in Wireless Ad-hoc Networks with Multiple Paths
Abstract. Wireless Ad-hoc networks are distributed systems that often reside in error-prone environments. Self-stabilization lets the system recover autonomously from an arbitrary ...
Andreas Larsson, Philippas Tsigas
GI
2004
Springer
13 years 11 months ago
A Low-Cost Solution for Frequent Symmetric Key Exchange in Ad-hoc Networks
: Next to authentication, secure key exchange is considered the most critical and complex issue regarding ad-hoc network security. We present a low-cost, (i.e. low hardware-complex...
Markus Volkmer, Sebastian Wallner
CCS
2009
ACM
14 years 10 days ago
Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes
Large-scale distributed systems have dense, complex code-bases that are assumed to perform multiple and inter-dependent tasks while user interaction is present. The way users inte...
Angelos Stavrou, Gabriela F. Cretu-Ciocarlie, Mich...