Sciweavers

1737 search results - page 78 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
ICRA
2010
IEEE
158views Robotics» more  ICRA 2010»
14 years 9 months ago
Towards optimally efficient field estimation with threshold-based pruning in real robotic sensor networks
Abstract-- The efficiency of distributed sensor networks depends on an optimal trade-off between the usage of resources and data quality. The work in this paper addresses the probl...
Amanda Prorok, Christopher M. Cianci, Alcherio Mar...
CCS
2007
ACM
15 years 6 months ago
A k-anonymous communication protocol for overlay networks
Anonymity is increasingly important for network applications concerning about censorship and privacy. The existing anonymous communication protocols generally stem from mixnet and...
Pan Wang, Peng Ning, Douglas S. Reeves
JCDL
2011
ACM
301views Education» more  JCDL 2011»
14 years 2 months ago
Archiving the web using page changes patterns: a case study
A pattern is a model or a template used to summarize and describe the behavior (or the trend) of a data having generally some recurrent events. Patterns have received a considerab...
Myriam Ben Saad, Stéphane Gançarski
SAFECOMP
2007
Springer
15 years 6 months ago
Electronic Distribution of Airplane Software and the Impact of Information Security on Airplane Safety
The general trend towards ubiquitous networking has reached the realm of airplanes. E-enabled airplanes with wired and wireless network interfaces offer a wide spectrum of network ...
Richard Robinson, Mingyan Li, Scott Lintelman, Kri...
CCS
2010
ACM
15 years 29 days ago
Securing wireless sensor networks against large-scale node capture attacks
Securing wireless sensor networks against node capture is a challenging task. All well-known random key pre-distribution systems, including the Eschenauer and Gligor's pionee...
Tuan Manh Vu, Reihaneh Safavi-Naini, Carey William...