Sciweavers

802 search results - page 132 / 161
» Insider Attacker Detection in Wireless Sensor Networks
Sort
View
RAID
2005
Springer
15 years 3 months ago
Defending Against Injection Attacks Through Context-Sensitive String Evaluation
Abstract. Injection vulnerabilities pose a major threat to applicationlevel security. Some of the more common types are SQL injection, crosssite scripting and shell injection vulne...
Tadeusz Pietraszek, Chris Vanden Berghe
CCE
2007
14 years 9 months ago
Water networks security: A two-stage mixed-integer stochastic program for sensor placement under uncertainty
This work describes a stochastic approach for the optimal placement of sensors in municipal water networks to detect maliciously injected contaminants. The model minimizes the exp...
Vicente Rico-Ramírez, Sergio Frausto-Hern&a...
GLOBECOM
2008
IEEE
15 years 4 months ago
Intra-Vehicle UWB Channel Measurements and Statistical Analysis
—Ultra-wideband (UWB) technique attracts attention from automotive manufacturers as a potential way to construct intra-vehicle wireless sensor network. This paper reports our pre...
Weihong Niu, Jia Li, Timothy Talty
76
Voted
AMCS
2010
146views Mathematics» more  AMCS 2010»
14 years 9 months ago
Sensor network design for the estimation of spatially distributed processes
satisfactory network connectivity have dominated this line of research and abstracted away from the mathematical description of the physical processes underlying the observed pheno...
Dariusz Ucinski, Maciej Patan
SECON
2008
IEEE
15 years 4 months ago
A Three-Tier Framework for Intruder Information Sharing in Sensor Networks
—In sensor networks, an intruder (i.e., compromised node) identified and isolated in one place can be relocated and/or duplicated to other places to continue attacks; hence, det...
Bin Tong, Santosh Panchapakesan, Wensheng Zhang