Sciweavers

736 search results - page 96 / 148
» Detection of Masquerade Attacks on Wireless Sensor Networks
Sort
View
SP
2002
IEEE
14 years 9 months ago
Stateful Intrusion Detection for High-Speed Networks
As networks become faster there is an emerging need for security analysis techniques that can keep up with the increased network throughput. Existing network-based intrusion detec...
Christopher Krügel, Fredrik Valeur, Giovanni ...
ALGOSENSORS
2009
Springer
15 years 4 months ago
Self-stabilizing Deterministic Gathering
Abstract. In this paper, we investigate the possibility to deterministically solve the gathering problem (GP) with weak robots (anonymous, autonomous, disoriented, deaf and dumb, a...
Yoann Dieudonné, Franck Petit
SSDBM
2006
IEEE
111views Database» more  SSDBM 2006»
15 years 3 months ago
Efficient Data Harvesting for Tracing Phenomena in Sensor Networks
Many publisWsubscribe systems have been built using wireless sensor networks, WSNs, deployedfor real-world environmentaldata collection, securitymonitoring,and object tracking. Ho...
Adesola Omotayo, Moustafa A. Hammad, Ken Barker
MODELLIERUNG
2008
14 years 11 months ago
Domain-Specific Languages for Wireless Sensor Networks
The development of software for wireless sensor networks is involved and complex. This does not only impose much work on programmers but also prevents domain experts from directly ...
Daniel A. Sadilek
DCOSS
2006
Springer
15 years 1 months ago
Locating Compromised Sensor Nodes Through Incremental Hashing Authentication
Abstract. While sensor networks have recently emerged as a promising computing model, they are vulnerable to various node compromising attacks. In this paper, we propose COOL, a CO...
Youtao Zhang, Jun Yang 0002, Lingling Jin, Weijia ...