Sciweavers

2503 search results - page 68 / 501
» Building Computer Network Attacks
Sort
View
IPSN
2009
Springer
15 years 4 months ago
Monitoring heritage buildings with wireless sensor networks: The Torre Aquila deployment
Wireless sensor networks are untethered infrastructures that are easy to deploy and have limited visual impact—a key asset in monitoring heritage buildings of artistic interest....
Matteo Ceriotti, Luca Mottola, Gian Pietro Picco, ...
IPPS
2007
IEEE
15 years 4 months ago
A Global Security Architecture for Intrusion Detection on Computer Networks
— Detecting all kinds of intrusions efficiently requires a global view of the monitored network. Built to increase the security of computer networks, traditional IDS are unfortu...
Abdoul Karim Ganame, Julien Bourgeois, Renaud Bido...
RTSS
2005
IEEE
15 years 3 months ago
Building Robust Wireless LAN for Industrial Control with DSSS-CDMA Cellphone Network Paradigm
Deploying Wireless LAN for Industrial Control (ICWLAN) has many benefits, such as mobility, low deployment cost and ease of reconfiguration. However, the top concern is robustne...
Qixin Wang, Xue Liu, Weiqun Chen, Wenbo He, Marco ...
BMCBI
2006
181views more  BMCBI 2006»
14 years 10 months ago
Automatic pathway building in biological association networks
Background: Scientific literature is a source of the most reliable and comprehensive knowledge about molecular interaction networks. Formalization of this knowledge is necessary f...
Anton Yuryev, Zufar Mulyukov, Ekaterina Kotelnikov...
RAID
1999
Springer
15 years 2 months ago
Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems
Distributed intrusion detection systems are especially vulnerable to attacks because the components reside at a static location and are connected together into a hierarchical stru...
Peter Mell, Mark McLarnon