Sciweavers

642 search results - page 39 / 129
» Detecting Spoofed Packets
Sort
View
ICASSP
2008
IEEE
15 years 8 months ago
Listener detection of talker stress in low-rate coded speech
We describe an experiment where listeners were asked to detect two specific forms of stress in talkers’ recorded voices heard via six different simulated communication systems. ...
Stephen Voran
IJNSEC
2010
112views more  IJNSEC 2010»
14 years 8 months ago
Detecting Connection-Chains: A Data Mining Approach
A connection-chain refers to a mechanism in which someone recursively logs into a host, then from there logs into another host, and so on. Connection-chains represent an important...
Ahmad Almulhem, Issa Traoré
INTELLCOMM
2004
Springer
15 years 7 months ago
An Implementation of Indoor Location Detection Systems Based on Identifying Codes
We present the design, implementation and evaluation of a location detection system built over a Radio Frequency network based on the IEEE 802.11 standard. Our system employs beac...
Rachanee Ungrangsi, Ari Trachtenberg, David Starob...
AINA
2007
IEEE
15 years 2 months ago
Detecting Anomaly Node Behavior in Wireless Sensor Networks
Wireless sensor networks are usually deployed in a way “once deployed, never changed”. The actions of sensor nodes are either pre-scheduled inside chips or triggered to respon...
Qinghua Wang, Tingting Zhang
SECPERU
2006
IEEE
15 years 8 months ago
Detecting Critical Nodes for MANET Intrusion Detection Systems
Ad hoc routing protocols have been designed to efficiently reroute traffic when confronted with network congestion, faulty nodes, and dynamically changing topologies. The common d...
A. Karygiannis, E. Antonakakis, A. Apostolopoulos