Sciweavers

376 search results - page 63 / 76
» Blocking Vulnerable Paths of Wireless Sensor Networks
Sort
View
ATAL
2009
Springer
15 years 4 months ago
A sensor middleware and agent-based communication platform for supply-chain management
We present a supply-chain management system that supports transportation of cargo containers and monitors the quality of control during transport. Our system primarily focuses on ...
Klaas Thoelen, Sam Michiels, Wouter Joosen, Koen V...
SENSYS
2010
ACM
14 years 7 months ago
PipeProbe: a mobile sensor droplet for mapping hidden pipeline
This paper presents PipeProbe, a mobile sensor system for determining the spatial topology of hidden water pipelines behind walls. PipeProbe works by dropping a tiny wireless sens...
Tsung-Te Lai, Yu-Han Chen, Polly Huang, Hao-Hua Ch...
NDSS
2005
IEEE
15 years 3 months ago
The Internet Motion Sensor - A Distributed Blackhole Monitoring System
As national infrastructure becomes intertwined with emerging global data networks, the stability and integrity of the two have become synonymous. This connection, while necessary,...
Michael Bailey, Evan Cooke, Farnam Jahanian, Jose ...
SASN
2006
ACM
15 years 3 months ago
Attacker traceback with cross-layer monitoring in wireless multi-hop networks
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to its limited network/host resources. Attacker traceback is a promi...
Yongjin Kim, Ahmed Helmy
77
Voted
JCS
2007
84views more  JCS 2007»
14 years 9 months ago
On the security of group communication schemes
Many emerging applications in both wired and wireless networks need support of secure group communications. There have been many secure group communication schemes in the setting ...
Shouhuai Xu