—The complexity of modern networked information systems, as well as all the defense-in-depth best practices, require distributed intrusion detection architectures relying on the ...
— In this paper, the detection of a correlated Gaussian field using a large multi-hop sensor network is investigated. A cooperative routing strategy is proposed by introducing a...
Youngchul Sung, Saswat Misra, Lang Tong, Anthony E...
Abstract. We introduce an approach to detecting inconsistencies in large biological networks by using Answer Set Programming. To this end, we build upon a recently proposed notion ...
Martin Gebser, Torsten Schaub, Sven Thiele, Philip...
Web-based communities have become important places for people to seek and share expertise. We find that networks in these communities typically differ in their topology from other...
In this paper, an anomaly detection approach that fuses data gathered from different nodes in a distributed wireless sensor network is proposed and evaluated. The emphasis of this...