Sciweavers

1737 search results - page 151 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
162
Voted
TPDS
2008
183views more  TPDS 2008»
15 years 4 months ago
Avoiding Energy Holes in Wireless Sensor Networks with Nonuniform Node Distribution
In this paper, we investigate the theoretical aspects of the nonuniform node distribution strategy used to mitigate the energy hole problem in wireless sensor networks (WSNs). We c...
Xiaobing Wu, Guihai Chen, Sajal K. Das
WISTP
2010
Springer
15 years 12 months ago
MoteAODV - An AODV Implementation for TinyOS 2.0
Reliable, inexpensive, on-the-fly networks can be established using mobile ad-hoc network (MANET) technology. Such networks can be used in a wide variety of scenarios ranging from...
Werner Backes, Jared Cordasco
JSW
2008
98views more  JSW 2008»
15 years 4 months ago
Towards a Collaborative and Systematic Approach to Alert Verification
With the menace of hackers increasing every day, even well administrated networks are vulnerable to attack. Therefore, securing network assets has become a significant issue for th...
Xuejiao Liu, Debao Xiao, Xi Peng
179
Voted
IWANN
2005
Springer
15 years 10 months ago
Face Recognition System Based on PCA and Feedforward Neural Networks
Face recognition is one of the most important image processing research topics which is widely used in personal identification, verification and security applications. In this pape...
Alaa Eleyan, Hasan Demirel
SP
2008
IEEE
129views Security Privacy» more  SP 2008»
15 years 11 months ago
Secure Web Browsing with the OP Web Browser
Abstract—Current web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems via browser-based attacks. Browser security efforts that re...
Chris Grier, Shuo Tang, Samuel T. King