Sciweavers

46 search results - page 3 / 10
» iscc 2006
Sort
View
ISCC
2006
IEEE
256views Communications» more  ISCC 2006»
13 years 11 months ago
A Wireless Distributed Intrusion Detection System and a New Attack Model
Denial-of-Service attacks, and jamming in particular, are a threat to wireless networks because they are at the same time easy to mount and difficult to detect and stop. We propo...
Marco Domenico Aime, Giorgio Calandriello, Antonio...
ISCC
2006
IEEE
103views Communications» more  ISCC 2006»
13 years 11 months ago
Mobile Location in GSM Networks using Database Correlation with Bayesian Estimation
We present a database correlation method combined with Bayesian estimation for mobile location in GSM networks. The final location request can be estimated using different ways. T...
Mohamed Khalaf-Allah, Kyandoghere Kyamakya
ISCC
2006
IEEE
169views Communications» more  ISCC 2006»
13 years 11 months ago
Hierarchical Anomaly Detection in Distributed Large-Scale Sensor Networks
In this paper, an anomaly detection approach that fuses data gathered from different nodes in a distributed wireless sensor network is proposed and evaluated. The emphasis of this...
Vasilis Chatzigiannakis, Symeon Papavassiliou, Mar...
ISCC
2006
IEEE
109views Communications» more  ISCC 2006»
13 years 11 months ago
Distributed Explicit Partial Rerouting (DEPR) Scheme for Load Balancing in MPLS Networks
Traffic engineering is one of the important enhancements introduced by the deployment of Multiprotocol Label Switching (MPLS) into IP-networks. Minimizing congestion is a central ...
Sherif Ibrahim Mohamed, Khaled M. F. Elsayed
ISCC
2006
IEEE
13 years 11 months ago
Using Web Services for Bridging End-User Applications and Wireless Sensor Networks
Applications are the ultimate consumers of the information collected by sensors. There exist several frameworks for the interactions between end-user applications and sensors. They...
Truong Ta, Nuru Yakub Othman, Roch H. Glitho, Ferh...