Sciweavers

960 search results - page 154 / 192
» The disaster of central control
Sort
View
CORR
2010
Springer
151views Education» more  CORR 2010»
14 years 12 months ago
Behavioural Correlation for Detecting P2P Bots
In the past few years, IRC bots, malicious programs which are remotely controlled by the attacker through IRC servers, have become a major threat to the Internet and users. These ...
Yousof Al-Hammadi, Uwe Aickelin
CORR
2010
Springer
432views Education» more  CORR 2010»
14 years 12 months ago
A Distributed Trust Management Framework for Detecting Malicious Packet Dropping Nodes in a Mobile Ad Hoc Network
In a multi-hop mobile ad hoc network (MANET) mobile nodes communicate with each other forming a cooperative radio network. Security remains a major challenge for these networks du...
Jaydip Sen
COMCOM
2006
213views more  COMCOM 2006»
14 years 12 months ago
Energy efficient information dissemination protocols by negotiation for wireless sensor networks
In this paper we consider a distributed and efficient information dissemination and retrieval system for wireless sensor networks. In such a system each sensor node operates auton...
Dandan Liu, Xiaodong Hu, Xiaohua Jia
CORR
2006
Springer
93views Education» more  CORR 2006»
14 years 12 months ago
Multirobot rendezvous with visibility sensors in nonconvex environments
This paper presents a coordination algorithm for mobile autonomous robots. Relying upon distributed sensing, the robots achieve rendezvous, that is, they move to a common location....
Anurag Ganguli, Jorge Cortés, Francesco Bul...
IJNSEC
2006
89views more  IJNSEC 2006»
14 years 11 months ago
Mitigation of Insider Risks using Distributed Agent Detection, Filtering, and Signaling
An insider-robust approach to file integrity verification is developed using interacting strata of mobile agents. Previous approaches relied upon monolithic architectures, or more...
Adam J. Rocke, Ronald F. DeMara