Sciweavers

736 search results - page 93 / 148
» Detection of Masquerade Attacks on Wireless Sensor Networks
Sort
View
DIMVA
2007
14 years 11 months ago
Characterizing Dark DNS Behavior
Security researchers and network operators increasingly rely on information gathered from honeypots and sensors deployed on darknets, or unused address space, for attack detection....
Jon Oberheide, Manish Karir, Zhuoqing Morley Mao

Lecture Notes
404views
16 years 7 months ago
Network Security
A comprehensive treatment of network security. Topics include remote access security, DMZ, firewalls, VPNs, PKI architecture, X.509 Public key infrastructure, web security, S-HTTP,...
Raj Jain
MOBISYS
2007
ACM
15 years 9 months ago
NodeMD: diagnosing node-level faults in remote wireless sensor systems
Software failures in wireless sensor systems are notoriously difficult to debug. Resource constraints in wireless deployments substantially restrict visibility into the root cause...
Veljko Krunic, Eric Trumpler, Richard Han
SENSYS
2006
ACM
15 years 3 months ago
Interest dissemination with directional antennas for wireless sensor networks with mobile sinks
Introducing mobile data sinks into wireless sensor networks (WSNs) improves the energy efficiency and the network lifetime, and is demanded for many application scenarios, such a...
Yihong Wu, Lin Zhang, Yiqun Wu, Zhisheng Niu
ATVA
2005
Springer
156views Hardware» more  ATVA 2005»
15 years 3 months ago
An EFSM-Based Intrusion Detection System for Ad Hoc Networks
Mobile ad hoc networks offer very interesting perspectives in wireless communications due to their easy deployment and their growing performances. However, due to their inherent c...
Jean-Marie Orset, Baptiste Alcalde, Ana R. Cavalli