The efficacy of Anomaly Detection (AD) sensors depends heavily on the quality of the data used to train them. Artificial or contrived training data may not provide a realistic v...
Gabriela F. Cretu, Angelos Stavrou, Michael E. Loc...
Ad hoc routing protocols have been designed to efficiently reroute traffic when confronted with network congestion, faulty nodes, and dynamically changing topologies. The common d...
We present Airavat, a MapReduce-based system which provides strong security and privacy guarantees for distributed computations on sensitive data. Airavat is a novel integration o...
Indrajit Roy, Srinath T. V. Setty, Ann Kilzer, Vit...
Ensuring anonymity in sensor networks is a major security goal. Using traffic analysis, the attacker can compromise the network functionality by correlating data flow patterns to ...
Abstract—Multimedia applications over wireless sensor networks (WSNs) are rapidly gaining interest by the research community in order to develop new and mission critical services...
M. Petracca, G. Litovsky, A. Rinotti, Marco Tacca,...