Sciweavers

282 search results - page 31 / 57
» Anomaly detection in a mobile communication network
Sort
View
CDC
2008
IEEE
206views Control Systems» more  CDC 2008»
15 years 4 months ago
Coverage control for mobile networks with limited-range anisotropic sensors
Abstract— In this paper the coverage control for mobile sensor networks is studied. The novelty is to consider an anisotropic sensor model where the performance of the sensor dep...
Azwirman Gusrialdi, Takeshi Hatanaka, Masayuki Fuj...
INFOCOM
2005
IEEE
15 years 3 months ago
HADOF: defense against routing disruptions in mobile ad hoc networks
— HADOF is a set of mechanisms to defend against routing disruptions in mobile ad hoc networks. Based on the observed behavior and the history record of each node, HADOF aims to ...
Wei Yu, Yan Sun, K. J. Ray Liu
MDM
2009
Springer
126views Communications» more  MDM 2009»
15 years 4 months ago
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory
Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have bee...
Wenjia Li, Anupam Joshi
INFOCOM
2009
IEEE
15 years 4 months ago
Defending Mobile Phones from Proximity Malware
—As mobile phones increasingly become the target of propagating malware, their use of direct pair-wise communication mechanisms, such as Bluetooth and WiFi, pose considerable cha...
Gjergji Zyba, Geoffrey M. Voelker, Michael Liljens...
INFOCOM
2011
IEEE
14 years 1 months ago
Identifying mobiles hiding behind wireless routers
—The network address translation technique (NAT) is widely used in wireless routers. It is a low cost solution to IPv4 address space limitations. However, cyber criminals may abu...
Yinjie Chen, Zhongli Liu, Benyuan Liu, Xinwen Fu, ...