Sciweavers

699 search results - page 107 / 140
» Cooperative Intrusion Detection in Wireless Sensor Networks
Sort
View
HPDC
2007
IEEE
15 years 1 months ago
Transparent network services via a virtual traffic layer for virtual machines
We claim that network services can be transparently added to existing unmodified applications running inside virtual machine environments. Examples of these network services inclu...
John R. Lange, Peter A. Dinda
NETWORK
2006
177views more  NETWORK 2006»
14 years 9 months ago
Jamming sensor networks: attack and defense strategies
Wireless sensor networks are built upon a shared medium that makes it easy for adversaries to conduct radio interference, or jamming, attacks that effectively cause a denial of se...
Wenyuan Xu, Ke Ma, Wade Trappe, Yanyong Zhang
ICNP
2009
IEEE
15 years 4 months ago
Attack-Tolerant Distributed Sensing for Dynamic Spectrum Access Networks
—Accurate sensing of the spectrum condition is of crucial importance to the mitigation of the spectrum scarcity problem in dynamic spectrum access (DSA) networks. Specifically, ...
Alexander W. Min, Kang G. Shin, Xin Hu
SENSYS
2004
ACM
15 years 3 months ago
Practical and robust geographic routing in wireless networks
Existing geographic face routing algorithms use planarization techniques that rely on the unit-graph assumption, and thus can exhibit persistent routing failure when used with rea...
Young-Jin Kim, Ramesh Govindan, Brad Karp, Scott S...
AINA
2010
IEEE
15 years 1 months ago
Detecting Suspicious Motion with Nonimaging Sensors
—Automated distributed sentry systems need only detect suspicious behavior. Microphones and infrared detectors may suffice, as well as being simpler and cheaper than cameras whil...
Neil C. Rowe, Ahren A. Reed, Jose J. Flores