Sciweavers

73 search results - page 11 / 15
» Energy Efficient Intrusion Detection in Camera Sensor Networ...
Sort
View
JNSM
2008
93views more  JNSM 2008»
14 years 11 months ago
Optimal IDS Sensor Placement and Alert Prioritization Using Attack Graphs
We optimally place intrusion detection system (IDS) sensors and prioritize IDS alerts using attack graph analysis. We begin by predicting all possible ways of penetrating a networ...
Steven Noel, Sushil Jajodia
ICCD
2008
IEEE
136views Hardware» more  ICCD 2008»
15 years 8 months ago
A resource efficient content inspection system for next generation Smart NICs
— The aggregate power consumption of the Internet is increasing at an alarming rate, due in part to the rapid increase in the number of connected edge devices such as desktop PCs...
Karthik Sabhanatarajan, Ann Gordon-Ross
WIMOB
2007
IEEE
15 years 6 months ago
A New Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks
—The low-cost, unattended nature and the capability of self-organizing of sensors, yield the use of Wireless Sensor Networks (WSN) very popular to day. Unfortunately, the unshiel...
Chakib Bekara, Maryline Laurent-Maknavicius
COMCOM
2006
95views more  COMCOM 2006»
14 years 11 months ago
E-Span and LPT for data aggregation in wireless sensor networks
In wireless sensor networks (WSNs), when a stimulus or event is detected within a particular region, data reports from the neighboring sensor nodes (sources) are sent to the sink ...
Weinan Marc Lee, Vincent W. S. Wong
JSAC
2008
196views more  JSAC 2008»
14 years 11 months ago
Comparison and Evaluation of the T-Lohi MAC for Underwater Acoustic Sensor Networks
Abstract--This paper introduces T-Lohi, a new class of distributed and energy-efficient media-access protocols (MAC) for underwater acoustic sensor networks (UWSN). MAC design for ...
Affan A. Syed, Wei Ye, John S. Heidemann