Sciweavers

301 search results - page 40 / 61
» Resilient Aggregation with Attack Detection in Sensor Networ...
Sort
View
142
Voted
INFOCOM
2011
IEEE
14 years 5 months ago
Maintaining source privacy under eavesdropping and node compromise attacks
—In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can...
Kanthakumar Pongaliur, Li Xiao
ICDE
2006
IEEE
138views Database» more  ICDE 2006»
15 years 8 months ago
Toward a Query Language for Network Attack Data
The growing sophistication and diversity of malicious activity in the Internet presents a serious challenge for network security analysts. In this paper, we describe our efforts t...
Bee-Chung Chen, Vinod Yegneswaran, Paul Barford, R...
95
Voted
HICSS
2007
IEEE
95views Biometrics» more  HICSS 2007»
15 years 8 months ago
Protecting with Sensor Networks: Attention and Response
Sensor networks are expected to play an important role in hybrid protection infrastructures when combined with robots and human decision makers. In order to be effective, detectio...
Jeffrey V. Nickerson, Stephan Olariu
129
Voted
CCR
2004
168views more  CCR 2004»
15 years 1 months ago
Coping with irregular spatio-temporal sampling in sensor networks
Wireless sensor networks have attracted attention from a diverse set of researchers, due to the unique combination of distributed, resource and data processing constraints. Howeve...
Deepak Ganesan, Sylvia Ratnasamy, Hanbiao Wang, De...
119
Voted
MDM
2010
Springer
250views Communications» more  MDM 2010»
15 years 3 months ago
Defending Wireless Sensor Networks against Adversarial Localization
In this paper, we study the issue of defending against adversarial localization in wireless sensor networks. Adversarial localization refers to attacks where an adversary attempts...
Neelanjana Dutta, Abhinav Saxena, Sriram Chellappa...