Sciweavers

197 search results - page 22 / 40
» A Deployment Value Model for Intrusion Detection Sensors
Sort
View
SIMULATION
2010
178views more  SIMULATION 2010»
14 years 6 months ago
Application-level Simulation for Network Security
We introduce and describe a novel network simulation tool called NeSSi (Network Security Simulator). NeSSi incorporates a variety of features relevant to network security distingu...
Stephan Schmidt, Rainer Bye, Joël Chinnow, Ka...
KES
2005
Springer
15 years 5 months ago
In Use Parameter Estimation of Inertial Sensors by Detecting Multilevel Quasi-static States
Abstract. We present an autoadaptive algorithm for in-use parameter estimation of MEMS inertial accelerometers and gyros1 using multilevel quasi-static states for greater accuracy ...
Ashutosh Saxena, Gaurav Gupta, Vadim Gerasimov, S&...
PERCOM
2010
ACM
14 years 10 months ago
Analysis of Quality of Surveillance in fusion-based sensor networks
—Recent years have witnessed the deployments of wireless sensor networks for mission-critical applications such as battlefield monitoring and security surveillance. These applic...
Rui Tan, Guoliang Xing, Xunteng Xu, Jianping Wang
SRDS
2008
IEEE
15 years 6 months ago
POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks
Unattended Wireless Sensor Networks (UWSNs) are composed of many small resource-constrained devices and operate autonomously, gathering data which is periodically collected by a v...
Roberto Di Pietro, Di Ma, Claudio Soriente, Gene T...
ETRICS
2006
15 years 3 months ago
Simplifying Signature Engineering by Reuse
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...