Sciweavers

2503 search results - page 215 / 501
» Building Computer Network Attacks
Sort
View
AINA
2009
IEEE
15 years 8 months ago
Understanding Behavioural Tradeoffs in Large-Scale Sensornet Design
When designing a complex system such as a sensornet it is not always practical to build and deploy a realistically sized prototype. At the same time many of the interesting behavi...
Jonathan Tate, Iain Bate
COLCOM
2007
IEEE
15 years 8 months ago
Cooperative security in distributed sensor networks
— Distributed sensor network protocols, such as routing, time synchronization or data aggregation protocols make use of collaborative techniques to minimize the consumption of sc...
Oscar García Morchon, Heribert Baldus, Tobi...
SAC
2004
ACM
15 years 7 months ago
Unsupervised learning techniques for an intrusion detection system
With the continuous evolution of the types of attacks against computer networks, traditional intrusion detection systems, based on pattern matching and static signatures, are incr...
Stefano Zanero, Sergio M. Savaresi
KIVS
2005
Springer
15 years 7 months ago
Epidemic Dissemination of Presence Information in Mobile Instant Messaging Systems
This paper presents an approach for exchanging presence information between users of an instant messaging system in a mobile ad hoc network. As major feature, presence information ...
Christoph Lindemann, Oliver P. Waldhorst
PEWASUN
2006
ACM
15 years 8 months ago
Wave propagation using the photon path map
In wireless network planning, much effort is spent on the improvement of the network and transport layer – especially for Mobile Ad Hoc Networks. Although in principle realworl...
Arne Schmitz, Leif Kobbelt