Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
Abstract. We are witnessing a dramatic increase in the use of datacentric distributed systems such as global grid infrastructures, sensor networks, network monitoring, and various ...
We discuss the design of an acquisitional query processor for data collection in sensor networks. Acquisitional issues are those that pertain to where, when, and how often data is...
Samuel Madden, Michael J. Franklin, Joseph M. Hell...
— We propose a fuzzy-based decision-making mechanism for selecting data dissemination protocols in wireless sensor networks (WSNs). Its goal is to select the most efficient proto...