Sciweavers

699 search results - page 52 / 140
» Cooperative Intrusion Detection in Wireless Sensor Networks
Sort
View
COMCOM
2007
136views more  COMCOM 2007»
14 years 9 months ago
A Delaunay Triangulation based method for wireless sensor network deployment
To obtain a satisfied performance of wireless sensor network, an adaptable sensor deployment method for various applications is essential. In this paper, we propose a centralized ...
Chun-Hsien Wu, Kuo-Chuan Lee, Yeh-Ching Chung
RAID
2007
Springer
15 years 3 months ago
Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems
We present a novel approach to remote traffic aggregation for Network Intrusion Detection Systems (NIDS) called Cooperative Selective Wormholing (CSW). Our approach works by select...
John R. Lange, Peter A. Dinda, Fabián E. Bu...

Lecture Notes
404views
16 years 7 months ago
Network Security
A comprehensive treatment of network security. Topics include remote access security, DMZ, firewalls, VPNs, PKI architecture, X.509 Public key infrastructure, web security, S-HTTP,...
Raj Jain
FORTE
2010
14 years 11 months ago
Grouping Nodes in Wireless Sensor Networks Using Coalitional Game Theory
Wireless sensor networks are typically ad-hoc networks of resource-constrained nodes; in particular, the nodes are limited in power resources. It can be difficult and costly to rep...
Fatemeh Kazemeyni, Einar Broch Johnsen, Olaf Owe, ...
ICRA
2006
IEEE
145views Robotics» more  ICRA 2006»
15 years 3 months ago
Instrumenting Wireless Sensor Networks for Real-time Surveillance
— This paper considers the problem of tracking an unknown number of targets using a wireless sensor network for surveillance. In particular, we consider the case in which each se...
Songhwai Oh, Phoebus Chen, Michael Manzo, Shankar ...