Sciweavers

2503 search results - page 235 / 501
» Building Computer Network Attacks
Sort
View
ICALT
2006
IEEE
15 years 8 months ago
Content-Based Positioning in Learning Networks
Positioning in learning networks is a process that assists learners in finding a starting point and an efficient route in the network that will foster competence building. In orde...
Jan van Bruggen, Ellen Rusman, Bas Giesbers, Rob K...
CONCUR
2005
Springer
15 years 8 months ago
A Compositional Approach to the Stochastic Dynamics of Gene Networks
We propose a compositional approach to the dynamics of gene regulatory networks based on the stochastic π-calculus, and develop a representation of gene network elements which can...
Luca Cardelli
AINA
2007
IEEE
15 years 2 months ago
Detecting Anomaly Node Behavior in Wireless Sensor Networks
Wireless sensor networks are usually deployed in a way “once deployed, never changed”. The actions of sensor nodes are either pre-scheduled inside chips or triggered to respon...
Qinghua Wang, Tingting Zhang
AINA
2010
IEEE
15 years 7 months ago
Mobile Element Path Planning for Time-Constrained Data Gathering in Wireless Sensor Networks
— We consider the problem of gathering data from a sensor network using mobile elements. In particular, we consider the case where the data are produced by measurements and need ...
Khaled Almiani, Anastasios Viglas, Lavy Libman
ICC
2007
IEEE
128views Communications» more  ICC 2007»
15 years 2 months ago
The Power of Temporal Pattern Processing in Anomaly Intrusion Detection
Abstract— A clear deficiency in most of todays Anomaly Intrusion Detection Systems (AIDS) is their inability to distinguish between a new form of legitimate normal behavior and ...
Mohammad Al-Subaie, Mohammad Zulkernine