Sciweavers

90 search results - page 1 / 18
» Tracking User Mobility to Detect Suspicious Behavior.
Sort
View
SDM
2009
SIAM
123views Data Mining» more  SDM 2009»
14 years 1 months ago
Tracking User Mobility to Detect Suspicious Behavior.
Popularity of mobile devices is accompanied by widespread security problems, such as MAC address spoofing in wireless networks. We propose a probabilistic approach to temporal an...
Gaurav Tandon, Philip K. Chan
GLOBECOM
2009
IEEE
13 years 2 months ago
CatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing
Collaborative spectrum sensing in cognitive radio networks has been proposed as an efficient way to improve the performance of primary users detection. In collaborative spectrum se...
Wenkai Wang, Husheng Li, Yan Sun, Zhu Han
CHI
2009
ACM
13 years 11 months ago
Tracking behavior in persuasive apps: is sensor-based detection always better than user self-reporting?
This paper aims to discuss the roles for the two types of tracking user behavior. Considering these two types of tracking, sensor based recognition has a great advantage when sens...
Miyuki Shiraishi, Yasuyuki Washio, Chihiro Takayam...
LCN
2008
IEEE
13 years 11 months ago
Key revocation based on Dirichlet multinomial model for mobile ad hoc networks
— The absence of an online trusted authority makes the issue of key revocation in mobile ad hoc networks (MANETs) particularly challenging. In this paper, we present a novel self...
Xinxin Fan, Guang Gong
ICC
2007
IEEE
136views Communications» more  ICC 2007»
13 years 11 months ago
Reputation-Based System for Encouraging the Cooperation of Nodes in Mobile Ad Hoc Networks
— In a mobile ad hoc network, node cooperation in packet forwarding is required for the network to function properly. However, since nodes in this network usually have limited re...
Tiranuch Anantvalee, Jie Wu