Sciweavers

861 search results - page 100 / 173
» Detecting cuts in sensor networks
Sort
View
JNSM
2008
93views more  JNSM 2008»
14 years 9 months ago
Optimal IDS Sensor Placement and Alert Prioritization Using Attack Graphs
We optimally place intrusion detection system (IDS) sensors and prioritize IDS alerts using attack graph analysis. We begin by predicting all possible ways of penetrating a networ...
Steven Noel, Sushil Jajodia
JCP
2006
131views more  JCP 2006»
14 years 9 months ago
Compression of Short Text on Embedded Systems
Abstract-- The paper details a scheme for lossless compression of short data series larger than 50 Bytes. The method uses arithmetic coding and context modeling with a low-complexi...
Stephan Rein, Clemens Gühmann, Frank H. P. Fi...
AINA
2007
IEEE
15 years 4 months ago
Wireless Sensor Network Applications in Urban Telehealth
Advances in wireless sensor network management have potential applications in urban telehealth. Telehealth is the delivery of health related services and information via telecommu...
Patricia Morreale
DSN
2007
IEEE
15 years 4 months ago
SLAM: Sleep-Wake Aware Local Monitoring in Sensor Networks
Sleep-wake protocols are critical in sensor networks to ensure long-lived operation. However, an open problem is how to develop efficient mechanisms that can be incorporated with ...
Issa Khalil, Saurabh Bagchi, Ness B. Shroff
DIMVA
2004
14 years 11 months ago
Alarm Reduction and Correlation in Intrusion Detection Systems
: Large Critical Complex Infrastructures are increasingly dependent on IP networks. Reliability by redundancy and tolerance are an imperative for such dependable networks. In order...
Tobias Chyssler, Stefan Burschka, Michael Semling,...