Sciweavers

861 search results - page 151 / 173
» Detecting cuts in sensor networks
Sort
View
SASN
2006
ACM
15 years 3 months ago
Attacker traceback with cross-layer monitoring in wireless multi-hop networks
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to its limited network/host resources. Attacker traceback is a promi...
Yongjin Kim, Ahmed Helmy
ACSAC
2006
IEEE
15 years 3 months ago
V-COPS: A Vulnerability-Based Cooperative Alert Distribution System
The efficiency of promptly releasing security alerts of established analysis centers has been greatly challenged by the continuous emergence of various large scale network attack...
Shiping Chen, Dongyu Liu, Songqing Chen, Sushil Ja...
ICDE
2005
IEEE
180views Database» more  ICDE 2005»
15 years 11 months ago
A Unified Framework for Monitoring Data Streams in Real Time
Online monitoring of data streams poses a challenge in many data-centric applications, such as telecommunications networks, traffic management, trend-related analysis, webclick st...
Ahmet Bulut, Ambuj K. Singh
88
Voted
DSN
2006
IEEE
15 years 3 months ago
Honeypot-Aware Advanced Botnet Construction and Maintenance
Because “botnets” can be used for illicit financial gain, they have become quite popular in recent Internet attacks. “Honeypots” have been successfully deployed in many d...
Cliff Changchun Zou, Ryan Cunningham
MOBIDE
2010
ACM
14 years 10 months ago
Power-aware operator placement and broadcasting of continuous query results
Complex event detection over data streams has become ubiquitous through the widespread use of sensors, wireless connectivity and the wide variety of end-user mobile devices. Typic...
Panayiotis Neophytou, Mohamed A. Sharaf, Panos K. ...