Sciweavers

478 search results - page 58 / 96
» Diameter and Center Computations in Networks
Sort
View
USS
2004
15 years 1 months ago
A Virtual Honeypot Framework
A honeypot is a closely monitored network decoy serving several purposes: it can distract adversaries from more valuable machines on a network, can provide early warning about new...
Niels Provos
ICNP
2003
IEEE
15 years 5 months ago
Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach
A prerequisite for secure communication between two nodes in an ad hoc network is that the nodes share a key to bootstrap their trust relationship. In this paper, we present a sca...
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jaj...
ICDCS
2010
IEEE
15 years 1 days ago
Design of Non-orthogonal Multi-channel Sensor Networks
—A critical issue in wireless sensor networks (WSNs) is represented by the network throughput. To meet the throughput requirement, researchers propose multi-channel design in 802...
Xing Xu, Ji Luo, Qian Zhang
VIZSEC
2005
Springer
15 years 5 months ago
Visual Correlation of Host Processes and Network Traffic
Anomalous communication patterns are one of the leading indicators of computer system intrusions according to the system administrators we have interviewed. But a major problem is...
Glenn A. Fink, Paul Muessig, Chris North
DCOSS
2011
Springer
13 years 11 months ago
Transmission Control Policy design for decentralized detection in sensor networks
—A Wireless Sensor Network (WSN) deployed for detection applications has the distinguishing feature that sensors cooperate to perform the detection task. Therefore, the decoupled...
Ashraf Tantawy, Xenofon D. Koutsoukos, Gautam Bisw...