Sciweavers

123
Voted
CNSR
2008
IEEE
214views Communications» more  CNSR 2008»
15 years 7 months ago
HGKM: A Group-Based Key Management Scheme for Sensor Networks Using Deployment Knowledge
Key establishment plays a central role in authentication and encryption in wireless sensor networks, especially when they are mainly deployed in hostile environments. Because of t...
Ngo Trong Canh, Young-Koo Lee, Sungyoung Lee
CNSR
2008
IEEE
189views Communications» more  CNSR 2008»
15 years 7 months ago
Secure Health Monitoring Network against Denial-Of-Service Attacks Using Cognitive Intelligence
Secure and energy efficient transmission is a main concern in many wireless sensor network applications. In this paper, two types of denial-of-service attacks that affect the rout...
Rajani Muraleedharan, Lisa Ann Osadciw
97
Voted
CNSR
2008
IEEE
169views Communications» more  CNSR 2008»
15 years 7 months ago
Critical Episode Mining in Intrusion Detection Alerts
One of the most important steps in attack detection using Intrusion Detection Systems (IDSs) is dealing with huge number of alerts that can be either critical single alerts and mu...
Mahboobeh Soleimani, Ali A. Ghorbani
121
Voted
CNSR
2008
IEEE
155views Communications» more  CNSR 2008»
15 years 7 months ago
Detecting Network Anomalies Using Different Wavelet Basis Functions
Signal processing techniques have been applied recently for analyzing and detecting network anomalies due to their potential to find novel or unknown intrusions. In this paper, we...
Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani
93
Voted
CNSR
2008
IEEE
151views Communications» more  CNSR 2008»
15 years 7 months ago
Discrete Model to Estimate Lifetime of a Wireless Sensor Network for Audio Storage
— Wireless sensor networks (WSNs) can be used to record and store audio data at remote and inaccessible places. However, audio data adds an additional concern to the design of th...
Sajid Hussain, Patrick Drane, Michael Mallinson
Communications
Top of PageReset Settings