The efficacy of Anomaly Detection (AD) sensors depends heavily on the quality of the data used to train them. Artificial or contrived training data may not provide a realistic v...
Gabriela F. Cretu, Angelos Stavrou, Michael E. Loc...
—A common vulnerability of wireless networks, in particular, the mobile ad hoc network (MANET), is their susceptibility to node compromise/physical capture attacks since the wire...
Abstract. The advent of context-aware computing requires a new paradigm in information management. Context information in a computing environment will take the form of disparate an...
If a mobile computing device knows how it is positioned and oriented in relation to other devices nearby, then it can provide enhanced support for multi-device and multi-user inte...
Mike Hazas, Christian Kray, Hans-Werner Gellersen,...
Many emerging applications in both wired and wireless networks, such as information dissemination and distributed collaboration in an adversarial environment, need support of secu...