Sciweavers

2195 search results - page 266 / 439
» Prototyping Networked Embedded Systems
Sort
View
115
Voted
IJSN
2008
80views more  IJSN 2008»
15 years 3 months ago
Syntax vs. semantics: competing approaches to dynamic network intrusion detection
: Malicious network traffic, including widespread worm activity, is a growing threat to Internet-connected networks and hosts. In this paper, we consider two competing approaches t...
Walter J. Scheirer, Mooi Choo Chuah
115
Voted
WWW
2008
ACM
16 years 4 months ago
Forcehttps: protecting high-security web sites from network attacks
As wireless networks proliferate, web browsers operate in an increasingly hostile network environment. The HTTPS protocol has the potential to protect web users from network attac...
Collin Jackson, Adam Barth
143
Voted
SAC
2010
ACM
15 years 10 months ago
Mobile air pollution monitoring network
Current methods of estimating air quality involve assigning a single value called the Air Quality Index (AQI) to a large land area for a 24-hour period based on a very few, sparse...
W. Hedgecock, Péter Völgyesi, Á...
136
Voted
LCN
2008
IEEE
15 years 10 months ago
DiCAP: Distributed Packet Capturing architecture for high-speed network links
— IP traffic measurements form the basis of several network management tasks, such as accounting, planning, intrusion detection, and charging. High-speed network links challenge ...
Cristian Morariu, Burkhard Stiller
PIMRC
2008
IEEE
15 years 10 months ago
A key loss recovery scheme for secure broadcasts in wireless sensor networks
Abstract—Authenticity and secrecy of broadcast message content is important in wireless sensor networks deployed for battlefield control, emergency response, and natural resourc...
Syed Taha Ali, Vijay Sivaraman, Ashay Dhamdhere, D...