Inference methods for detecting attacks on information resources typically use signature analysis or statistical anomaly detection methods. The former have the advantage of attack...
— Even for a specific application, the design space of wireless sensor networks is enormous, and traditional disciplinary boundaries are disappearing in the search for efficien...
Abstract-- Wireless sensor networks (WSNs) require energyef cient protocols to improve the network lifetime. In this work, we adopt a cross-layer strategy that considers routing an...
Wireless Sensor Networks (WSNs) are increasingly being proposed in scenarios whose requirements cannot be fully predicted, or where the system functionality must adapt to changing ...
Luca Mottola, Gian Pietro Picco, Adil Amjad Sheikh
Pervasive surveillance implies the continuous tracking of multiple targets as they move about the monitored region. The tasks to be performed by a surveillance system are expresse...
Amit Goradia, Zhiwei Cen, Clayton Haffner, Ning Xi...