Sciweavers

89 search results - page 11 / 18
» Selective and Early Threat Detection in Large Networked Syst...
Sort
View
JSAC
2006
156views more  JSAC 2006»
15 years 1 months ago
Wormhole attacks in wireless networks
Abstract-- As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
CN
2004
108views more  CN 2004»
15 years 1 months ago
Smart dust, friend or foe?--Replacing identity with configuration trust
Smart dust motes are miniature self-contained systems that may be deployed in very large numbers. In military applications these devices are subject to different threats than conv...
Howard Chivers, John A. Clark
JSS
2002
198views more  JSS 2002»
15 years 1 months ago
Automated discovery of concise predictive rules for intrusion detection
This paper details an essential component of a multi-agent distributed knowledge network system for intrusion detection. We describe a distributed intrusion detection architecture...
Guy G. Helmer, Johnny S. Wong, Vasant Honavar, Les...
DSN
2008
IEEE
15 years 8 months ago
Anomaly? application change? or workload change? towards automated detection of application performance anomaly and change
: Automated tools for understanding application behavior and its changes during the application life-cycle are essential for many performance analysis and debugging tasks. Applicat...
Ludmila Cherkasova, Kivanc M. Ozonat, Ningfang Mi,...
97
Voted
ICC
2007
IEEE
137views Communications» more  ICC 2007»
15 years 8 months ago
A Framework for Optimizing the Uplink Performance of Distributed Antenna Systems under a Constrained Backhaul
Abstract— It has recently been shown that multi-cell cooperations in cellular networks, enabling distributed antenna systems and joint transmission or joint detection across cell...
Patrick Marsch, Gerhard Fettweis