Denial-of-Service attacks, and jamming in particular, are a threat to wireless networks because they are at the same time easy to mount and difficult to detect and stop. We propo...
Marco Domenico Aime, Giorgio Calandriello, Antonio...
We present a database correlation method combined with Bayesian estimation for mobile location in GSM networks. The final location request can be estimated using different ways. T...
In this paper, an anomaly detection approach that fuses data gathered from different nodes in a distributed wireless sensor network is proposed and evaluated. The emphasis of this...
Traffic engineering is one of the important enhancements introduced by the deployment of Multiprotocol Label Switching (MPLS) into IP-networks. Minimizing congestion is a central ...
Applications are the ultimate consumers of the information collected by sensors. There exist several frameworks for the interactions between end-user applications and sensors. They...
Truong Ta, Nuru Yakub Othman, Roch H. Glitho, Ferh...