Sciweavers

1112 search results - page 166 / 223
» On scalable attack detection in the network
Sort
View
DCOSS
2006
Springer
15 years 3 months ago
Distributed User Access Control in Sensor Networks
User access control in sensor networks defines a process of granting user the access right to the information and resources. It is essential for the future real sensor network depl...
Haodong Wang, Qun Li
INFOCOM
2007
IEEE
15 years 6 months ago
Ranking-Based Optimal Resource Allocation in Peer-to-Peer Networks
—This paper presents a theoretic framework of optimal resource allocation and admission control for peer-topeer networks. Peer’s behavioral rankings are incorporated into the r...
Yonghe Yan, Adel El-Atawy, Ehab Al-Shaer
ITCC
2005
IEEE
15 years 5 months ago
A Lightweight Authentication Protocol for Mobile Ad Hoc Networks
The characteristics of mobile ad hoc networks (MANETs) determine that the authentication approaches to protect routing and data packet transmission in MANETs should be lightweight...
Bin Lu, Udo W. Pooch
ICRA
2005
IEEE
156views Robotics» more  ICRA 2005»
15 years 5 months ago
A Hierarchical Multiple-Target Tracking Algorithm for Sensor Networks
Abstract— Multiple-target tracking is a canonical application of sensor networks as it exhibits different aspects of sensor networks such as event detection, sensor information f...
Songhwai Oh, Luca Schenato, Shankar Sastry
DAGSTUHL
2006
15 years 1 months ago
SANA - Security Analysis in Internet Traffic through Artificial Immune Systems
The Attacks done by Viruses, Worms, Hackers, etc. are a Network Security-Problem in many Organisations. Current Intrusion Detection Systems have significant Disadvantages, e.g. the...
Michael Hilker, Christoph Schommer