Sciweavers

699 search results - page 94 / 140
» Cooperative Intrusion Detection in Wireless Sensor Networks
Sort
View
CDC
2010
IEEE
127views Control Systems» more  CDC 2010»
14 years 4 months ago
The wireless control network: Monitoring for malicious behavior
We consider the problem of stabilizing a plant with a network of resource constrained wireless nodes. In a companion paper, we developed a protocol where each node repeatedly trans...
Shreyas Sundaram, Miroslav Pajic, Christoforos N. ...
SENSYS
2010
ACM
14 years 7 months ago
Mapping the urban wireless landscape with Argos
Passive monitoring is an important tool for measuring, troubleshooting, and protecting modern wireless networks. To date, WiFi monitoring has focused primarily on indoor settings ...
Ian Rose, Matt Welsh
COOPIS
2002
IEEE
15 years 2 months ago
View Propagation and Inconsistency Detection for Cooperative Mobile Agents
Mobile agents are autonomous programs that migrate from one machine to another within a network on behalf of a client, thus, they are ideal for mobile computing environments since ...
Susan Weissman Lauzac, Panos K. Chrysanthis
MOBILIGHT
2010
14 years 4 months ago
Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks
Node capture is considered as one of the most critical issues in the security of wireless sensor networks. A popular approach to thwart the problem relies on the detection of event...
Giacomo de Meulenaer, François-Xavier Stand...
ACSAC
2008
IEEE
14 years 11 months ago
Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors
Anomaly Detection (AD) sensors compute behavior profiles to recognize malicious or anomalous activities. The behavior of a host is checked continuously by the AD sensor and an ale...
Vanessa Frías-Martínez, Salvatore J....