Sciweavers

197 search results - page 15 / 40
» A Deployment Value Model for Intrusion Detection Sensors
Sort
View
97
Voted
EUROSSC
2007
Springer
15 years 5 months ago
Behavior Detection Based on Touched Objects with Dynamic Threshold Determination Model
We are developing a context-aware application for use in homes, which detects high-level user behavior, such as “leaving the home” and “going to bed”, and provides services...
Hiroyuki Yamahara, Hideyuki Takada, Hiromitsu Shim...
134
Voted
WIMOB
2007
IEEE
15 years 6 months ago
A New Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks
—The low-cost, unattended nature and the capability of self-organizing of sensors, yield the use of Wireless Sensor Networks (WSN) very popular to day. Unfortunately, the unshiel...
Chakib Bekara, Maryline Laurent-Maknavicius
CEEMAS
2007
Springer
15 years 5 months ago
Agent-Based Network Protection Against Malicious Code
This paper presents an agent-based approach to Network Intrusion Prevention on corporate networks, emphasizing the protection from fast-spreading mobile malicious code outbreaks (e...
Martin Rehák, Michal Pechoucek, Jan Tozicka...
112
Voted
RTSS
2008
IEEE
15 years 6 months ago
Fast Sensor Placement Algorithms for Fusion-Based Target Detection
Mission-critical target detection imposes stringent performance requirements for wireless sensor networks, such as high detection probabilities and low false alarm rates. Data fus...
Zhaohui Yuan, Rui Tan, Guoliang Xing, Chenyang Lu,...
88
Voted
HUC
2009
Springer
15 years 4 months ago
Recognizing daily activities with RFID-based sensors
We explore a dense sensing approach that uses RFID sensor network technology to recognize human activities. In our setting, everyday objects are instrumented with UHF RFID tags ca...
Michael Buettner, Richa Prasad, Matthai Philipose,...