Sciweavers

802 search results - page 71 / 161
» Insider Attacker Detection in Wireless Sensor Networks
Sort
View
MSN
2005
Springer
124views Sensor Networks» more  MSN 2005»
15 years 3 months ago
Detecting SYN Flooding Attacks Near Innocent Side
Distributed Denial-of-Service (DDoS) attacks seriously threat the servers in the Internet. Most of current research is focused on the detection and prevention methods at the victim...
Yanxiang He, Wei Chen, Bin Xiao
SSDBM
2008
IEEE
146views Database» more  SSDBM 2008»
15 years 4 months ago
Kriging for Localized Spatial Interpolation in Sensor Networks
Abstract. The presence of coverage holes can adversely affect the accurate representation of natural phenomena being monitored by a Wireless Sensor Network (WSN). Current WSN resea...
Muhammad Umer, Lars Kulik, Egemen Tanin
GLOBECOM
2008
IEEE
15 years 4 months ago
Mesh-Based Coverage for Wireless Sensor Networks
—Wireless Sensor Networks (WSNs) consist of spatially-distributed autonomous sensors that can cooperatively monitor physical and environmental conditions. Because of sensors’ r...
Jiong Wang, Sirisha Medidi
NETWORK
2007
234views more  NETWORK 2007»
14 years 9 months ago
Surveillance Wireless Sensor Networks: Deployment Quality Analysis
Surveillance wireless sensor networks are deployed at perimeter or border locations to detect unauthorized intrusions. For deterministic deployment of sensors, the quality of depl...
Ertan Onur, Cem Ersoy, Hakan Deliç, Lale Ak...
MASS
2010
181views Communications» more  MASS 2010»
14 years 7 months ago
Perfectly anonymous data aggregation in wireless sensor networks
Clustering and data aggregation in wireless sensor networks improves scalability, and helps the efficient use of scarce resources. Yet, these mechanisms also introduce some securi...
Levente Buttyán, Tamás Holczer