Sciweavers

6195 search results - page 1091 / 1239
» Cloud Computing Security
Sort
View
ICNP
2009
IEEE
15 years 2 months ago
Memory Efficient Protocols for Detecting Node Replication Attacks in Wireless Sensor Networks
Sensor networks deployed in hostile areas are subject to node replication attacks, in which an adversary compromises a few sensors, extracts the security keys, and clones them in a...
Ming Zhang, Vishal Khanapure, Shigang Chen, Xuelia...
CVPR
2007
IEEE
16 years 7 months ago
Using Group Prior to Identify People in Consumer Images
While face recognition techniques have rapidly advanced in the last few years, most of the work is in the domain of security applications. For consumer imaging applications, perso...
Andrew C. Gallagher, Tsuhan Chen
IAJIT
2011
15 years 7 hour ago
Social Issues in wireless sensor networks with healthcare perspective
: The recent advances in Wireless Sensor Networks have given rise to many application areas in healthcare. It has produced new field of Wireless Body Area Networks. Using wearable ...
Moshaddique Al Ameen, Kyung Sup Kwak
TCSV
2010
14 years 11 months ago
Object Tracking in Structured Environments for Video Surveillance Applications
Abstract--We present a novel tracking method for effectively tracking objects in structured environments. The tracking method finds applications in security surveillance, traffic m...
Junda Zhu, Yuanwei Lao, Yuan F. Zheng
AINA
2010
IEEE
14 years 8 months ago
A Novel Cross Layer Intrusion Detection System in MANET
— Intrusion detection System forms a vital component of internet security. To keep pace with the growing trends, there is a critical need to replace single layer detection techno...
Rakesh Shrestha, Kyong-Heon Han, Dong-You Choi, Se...
« Prev « First page 1091 / 1239 Last » Next »