Sciweavers

235 search results - page 41 / 47
» The intrusion detection in mobile sensor network
Sort
View
SECON
2008
IEEE
15 years 4 months ago
STDCS: A Spatio-Temporal Data-Centric Storage Scheme For Real-Time Sensornet Applications
Sensor networks will shortly consist of globally deployed sensors providing real-time geo-centric information to users. Particularly, users with mobile devices will issue ad-hoc q...
Mohamed Aly, Anandha Gopalan, Jerry Zhao, Adel M. ...
70
Voted
WIMOB
2008
IEEE
15 years 4 months ago
An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs
— Node compromise is a serious threat in wireless sensor networks, as it enables an adversary to perform various attacks. Many security schemes exploit the redundancy of many wir...
Christoph Krauß, Markus Schneider, Claudia E...
DATAMINE
2006
164views more  DATAMINE 2006»
14 years 9 months ago
Fast Distributed Outlier Detection in Mixed-Attribute Data Sets
Efficiently detecting outliers or anomalies is an important problem in many areas of science, medicine and information technology. Applications range from data cleaning to clinica...
Matthew Eric Otey, Amol Ghoting, Srinivasan Partha...
RAID
2001
Springer
15 years 2 months ago
Probabilistic Alert Correlation
With the growing deployment of host and network intrusion detection systems, managing reports from these systems becomes critically important. We present a probabilistic approach t...
Alfonso Valdes, Keith Skinner
IWIA
2005
IEEE
15 years 3 months ago
Malware Defense Using Network Security Authentication
Malware defenses have primarily relied upon intrusion fingerprints to detect suspicious network behavior. While effective for discovering computers that are already compromised,...
Joseph V. Antrosio, Errin W. Fulp