Sciweavers

1112 search results - page 198 / 223
» On scalable attack detection in the network
Sort
View
COMCOM
2006
95views more  COMCOM 2006»
14 years 9 months ago
E-Span and LPT for data aggregation in wireless sensor networks
In wireless sensor networks (WSNs), when a stimulus or event is detected within a particular region, data reports from the neighboring sensor nodes (sources) are sent to the sink ...
Weinan Marc Lee, Vincent W. S. Wong
CASES
2009
ACM
15 years 25 days ago
A case study of on-chip sensor network in multiprocessor system-on-chip
Reducing feature sizes and power supply voltage allows integrating more processing units (PUs) on multiprocessor system-on-chip (MPSoC) to satisfy the increasing demands of applic...
Yu Wang 0002, Jiang Xu, Shengxi Huang, Weichen Liu...
ICICS
2004
Springer
15 years 2 months ago
Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV)
A mobile ad hoc network (MANET) is formed by a group of mobile wireless nodes, each of which functions as a router and agrees to forward packets for others. Many routing protocols ...
Tao Wan, Evangelos Kranakis, Paul C. van Oorschot
JIPS
2006
59views more  JIPS 2006»
14 years 9 months ago
A Light-weight and Dynamically Reconfigurable RMON Agent System
: A RMON agent system, which locates on a subnet, collects the network traffic information for management by retrieving and analyzing all of the packets on the subnet. The RMON age...
Jun-Hyung Lee, Zinwon Park, Myung-Kyun Kim
CCS
2010
ACM
14 years 8 months ago
Designs to account for trust in social network-based sybil defenses
Social network-based Sybil defenses exploit the trust exhibited in social graphs to detect Sybil nodes that disrupt an algorithmic property (i.e., the fast mixing) in these graphs...
Abedelaziz Mohaisen, Nicholas Hopper, Yongdae Kim