As networks become faster there is an emerging need for security analysis techniques that can keep up with the increased network throughput. Existing network-based intrusion detec...
Abstract. In this paper, we investigate the possibility to deterministically solve the gathering problem (GP) with weak robots (anonymous, autonomous, disoriented, deaf and dumb, a...
Many publisWsubscribe systems have been built using wireless sensor networks, WSNs, deployedfor real-world environmentaldata collection, securitymonitoring,and object tracking. Ho...
The development of software for wireless sensor networks is involved and complex. This does not only impose much work on programmers but also prevents domain experts from directly ...
Abstract. While sensor networks have recently emerged as a promising computing model, they are vulnerable to various node compromising attacks. In this paper, we propose COOL, a CO...
Youtao Zhang, Jun Yang 0002, Lingling Jin, Weijia ...