Sciweavers

802 search results - page 36 / 161
» Insider Attacker Detection in Wireless Sensor Networks
Sort
View
71
Voted
SUTC
2006
IEEE
15 years 3 months ago
Deploying a Sensor Network in an Extreme Environment
A wireless sensor network has been designed and deployed to gather data from nodes deployed inside glaciers. This paper describes the solutions to power management, radio communic...
Kirk Martinez, Paritosh Padhy, Ahmed Elsaify, Gang...
80
Voted
MDM
2007
Springer
209views Communications» more  MDM 2007»
15 years 3 months ago
Parallelized Simulated Annealing for Model Updating in Ad-Hoc Wireless Sensing Networks
The engineering community has recently begun to adopt wireless sensing technologies for use in many sensing applications. These low-cost sensors provide an optimal setting for den...
Andrew T. Zimmerman, Jerome P. Lynch
DISCEX
2003
IEEE
15 years 3 months ago
Statistical Approaches to DDoS Attack Detection and Response
The nature of the threats posed by Distributed Denial of Service (DDoS) attacks on large networks, such as the Internet, demands effective detection and response methods. These me...
Laura Feinstein, Dan Schnackenberg, Ravindra Balup...
86
Voted
ESAS
2006
Springer
15 years 1 months ago
So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks
Distance-bounding protocols aim to prevent an adversary from pretending that two parties are physically closer than they really are. We show that proposed distance-bounding protoco...
Jolyon Clulow, Gerhard P. Hancke, Markus G. Kuhn, ...
TMC
2010
210views more  TMC 2010»
14 years 8 months ago
Exploiting Reactive Mobility for Collaborative Target Detection in Wireless Sensor Networks
—Recent years have witnessed the deployments of wireless sensor networks in a class of mission-critical applications such as object detection and tracking. These applications oft...
Rui Tan, Guoliang Xing, Jianping Wang, Hing-Cheung...