Sciweavers

1423 search results - page 239 / 285
» Secure and Efficient Data Collection in Sensor Networks
Sort
View
DGO
2007
150views Education» more  DGO 2007»
14 years 11 months ago
Event-triggered data and knowledge sharing among collaborating government organizations
Solving complex global problems such as illegal immigration, border control, and terrorism requires government organizations at all levels to share not only data but, more importa...
Seema Degwekar, Jeff DePree, Howard W. Beck, Carla...
ACSAC
2007
IEEE
15 years 4 months ago
Countering False Accusations and Collusion in the Detection of In-Band Wormholes
Cooperative intrusion detection techniques for MANETs utilize ordinary computing hosts as network intrusion sensors. If compromised, these hosts may inject bogus data into the int...
Daniel Sterne, Geoffrey Lawler, Richard Gopaul, Br...
LISA
2000
14 years 11 months ago
Aberrant Behavior Detection in Time Series for Network Monitoring
The open-source software RRDtool and Cricket provide a solution to the problem of collecting, storing, and visualizing service network time series data for the real-time monitorin...
Jake D. Brutlag
SIGMOD
2008
ACM
188views Database» more  SIGMOD 2008»
15 years 10 months ago
Just-in-time query retrieval over partially indexed data on structured P2P overlays
Structured peer-to-peer (P2P) overlays have been successfully employed in many applications to locate content. However, they have been less effective in handling massive amounts o...
Sai Wu, Jianzhong Li, Beng Chin Ooi, Kian-Lee Tan
DBSEC
2010
319views Database» more  DBSEC 2010»
14 years 11 months ago
Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach
As online social networking sites become more and more popular, they have also attracted the attentions of the spammers. In this paper, Twitter, a popular micro-blogging service, i...
Alex Hai Wang