Sciweavers

139 search results - page 1 / 28
» Wireless Intrusion Detection Using Tracking Verification
Sort
View
70
Voted
ICC
2007
IEEE
15 years 10 months ago
Wireless Intrusion Detection Using Tracking Verification
Robert A. Malaney
162
Voted
HICSS
2003
IEEE
211views Biometrics» more  HICSS 2003»
15 years 9 months ago
Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks
In this paper we propose a distributed intrusion detection system for ad hoc wireless networks based on mobile agent technology. Wireless networks are particularly vulnerable to i...
Oleg Kachirski, Ratan K. Guha
129
Voted
COMCOM
2002
143views more  COMCOM 2002»
15 years 3 months ago
Security architecture testing using IDS - a case study
Many security approaches are currently used in organisations. In spite of the widespread use of these security techniques, network intrusion remains a problem. This paper discusse...
Theuns Verwoerd, Ray Hunt
233
Voted
AUSFORENSICS
2004
15 years 5 months ago
Wireless Snort - A WIDS in progress
The Snort intrusion detection system is a widely used and well-regarded open sourcesystem used for the detection of malicious activity in conventional wired networks. Recently, so...
Craig Valli
142
Voted
HICSS
2007
IEEE
222views Biometrics» more  HICSS 2007»
15 years 10 months ago
Battery-Sensing Intrusion Protection for Wireless Handheld Computers Using a Dynamic Threshold Calculation Algorithm for Attack
This paper proposes a pioneering Battery-Sensing Intrusion Protection System (B-SIPS) for mobile computers, which alerts on power changes detected on small wireless devices, using...
Timothy Buennemeyer, Faiz Munshi, Randy C. Marchan...