Sciweavers

1112 search results - page 171 / 223
» On scalable attack detection in the network
Sort
View
INCDM
2010
Springer
159views Data Mining» more  INCDM 2010»
15 years 4 months ago
Semi-supervised Learning for False Alarm Reduction
Abstract. Intrusion Detection Systems (IDSs) which have been deployed in computer networks to detect a wide variety of attacks are suffering how to manage of a large number of tri...
Chien-Yi Chiu, Yuh-Jye Lee, Chien-Chung Chang, Wen...
ISCC
2009
IEEE
254views Communications» more  ISCC 2009»
15 years 6 months ago
Monitoring connectivity in wireless sensor networks
It is important to have continuous connectivity in a wireless sensor network after it is deployed in a hostile environment. However, such networks are constrained by the low usert...
Benahmed Khelifa, Hafid Haffaf, Madjid Merabti, Da...
AIMS
2008
Springer
15 years 6 months ago
Towards Resilient Community Wireless Mesh Networks
Abstract. Wireless Mesh Networks are an increasingly common technology providing connectivity in many communities, particularly where Internet access is unavailable or restricted v...
Sara Bury, Nicholas J. P. Race
ICDCSW
2007
IEEE
15 years 6 months ago
Enhancing Neighborship Consistency for Peer-to-Peer Distributed Virtual Environments
Although P2P-based DVEs can potentially solve the scalability issues, other important issues such as consistency remain unexplored. In this paper, we address neighborship consiste...
Jehn-Ruey Jiang, Jiun-Shiang Chiou, Shun-Yun Hu
ICALP
2004
Springer
15 years 5 months ago
Group Spreading: A Protocol for Provably Secure Distributed Name Service
In order to enable communication between a dynamic collection of peers with given ID’s, such as “machine.cs.school.edu”, over the Internet, a distributed name service must b...
Baruch Awerbuch, Christian Scheideler