Sciweavers

7544 search results - page 170 / 1509
» Network Forensics Analysis
Sort
View
143
Voted
IWCMC
2006
ACM
15 years 9 months ago
Analysis of mobile beacon aided in-range localization scheme in ad hoc wireless sensor networks
In this paper, We mathematically model the In-Range localization scheme in the presence of a Mobile Beacon. In the In-Range localization scheme, a sensor with unknown location is ...
T. V. Srinath, Anil Kumar Katti, V. S. Ananthanara...
123
Voted
WOWMOM
2006
ACM
94views Multimedia» more  WOWMOM 2006»
15 years 9 months ago
Performance Analysis and Enhancement of the Next Generation Cellular Networks
— As more and more wireless subscribers access the Internet through cellular networks, Internet data traffic, which is known to be long range dependent (LRD), will soon dominate...
Xiang Yu, Chunming Qiao, Xin Wang, Dahai Xu
133
Voted
ACSAC
2005
IEEE
15 years 9 months ago
Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis
We propose a method to verify the result of attacks detected by signature-based network intrusion detection systems using lightweight protocol analysis. The observation is that ne...
Jingmin Zhou, Adam J. Carlson, Matt Bishop
152
Voted
WIOPT
2005
IEEE
15 years 9 months ago
Analysis of a Distributed Algorithm to Determine Multiple Routes with Path Diversity in Ad Hoc Networks
With multipath routing in mobile ad hoc networks (MANETs), a source can establish multiple routes to a destination for routing data. In MANETs, mulitpath routing can be used to pr...
Stephen Mueller, Dipak Ghosal
138
Voted
MSN
2005
Springer
179views Sensor Networks» more  MSN 2005»
15 years 9 months ago
Coverage Analysis for Wireless Sensor Networks
The coverage problem in wireless sensor networks (WSNs) is to determine the number of active sensor nodes needed to cover the sensing area. The purpose is to extend the lifetime of...
Ming Liu, Jiannong Cao, Wei Lou, Lijun Chen 0006, ...