1 Intrusion detection in MANETs is challenging because these networks change their topologies dynamically; lack concentration points where aggregated traffic can be analyzed; utili...
Daniel F. Sterne, Poornima Balasubramanyam, David ...
Learning patterns of human behavior from sensor data is extremely important for high-level activity inference. We show how to extract and label a personās activities and signiļ¬...
We address the problem of secure and fault-tolerant communication in the presence of adversaries across a multihop wireless network with frequently changing topology. To effectivel...
This paper presents Virtual Ring Routing (VRR), a new network routing protocol that occupies a unique point in the design space. VRR is inspired by overlay routing algorithms in D...
Matthew Caesar, Miguel Castro, Edmund B. Nightinga...
Abstract. A prominent source of complexity in the veriļ¬cation of ad hoc network (AHN) protocols is the fact that the number of network topologies grows exponentially with the squ...