Sciweavers

802 search results - page 42 / 161
» Insider Attacker Detection in Wireless Sensor Networks
Sort
View
CORR
2008
Springer
125views Education» more  CORR 2008»
14 years 9 months ago
Data Reduction in Intrusion Alert Correlation
: Network intrusion detection sensors are usually built around low level models of network traffic. This means that their output is of a similarly low level and as a consequence, ...
Gianni Tedesco, Uwe Aickelin
ISCC
2009
IEEE
188views Communications» more  ISCC 2009»
15 years 4 months ago
Distributed Erasure Coding in Data Centric Storage for wireless sensor networks
Abstract—In-network storage of data in wireless sensor networks contributes to reduce the communications inside the network and to favor data aggregation. In this paper, we consi...
Michele Albano, Stefano Chessa
INFOCOM
2012
IEEE
13 years 4 days ago
A robust boundary detection algorithm based on connectivity only for 3D wireless sensor networks
—In this work we develop a distributed boundary detection algorithm, dubbed Coconut, for 3D wireless sensor networks. It first constructs a tetrahedral structure to delineate th...
Hongyu Zhou, Hongyi Wu, Miao Jin
GLOBECOM
2008
IEEE
14 years 10 months ago
Robust Edge Detection in Wireless Sensor Networks
Abstract— The ability to geometrically represent sensed phenomena within a wireless sensor network can provide a more concise view than enumeration of all nodes identifying a phe...
Christopher J. Mallery, Muralidhar Medidi
GISCIENCE
2008
Springer
186views GIS» more  GISCIENCE 2008»
14 years 10 months ago
Detecting Topological Change Using a Wireless Sensor Network
Dynamic geographic phenomena, such as forest fires and oil spills, can have dire environmental, sociopolitical, and economic consequences. Mitigating, if not preventing such events...
Christopher Farah, Cheng Zhong, Michael F. Worboys...