Sciweavers

139 search results - page 9 / 28
» Wireless Intrusion Detection Using Tracking Verification
Sort
View
SDM
2009
SIAM
123views Data Mining» more  SDM 2009»
15 years 7 months ago
Tracking User Mobility to Detect Suspicious Behavior.
Popularity of mobile devices is accompanied by widespread security problems, such as MAC address spoofing in wireless networks. We propose a probabilistic approach to temporal an...
Gaurav Tandon, Philip K. Chan
ISCC
2006
IEEE
182views Communications» more  ISCC 2006»
15 years 3 months ago
CollECT: Collaborative Event deteCtion and Tracking in Wireless Heterogeneous Sensor Networks
Event detection and tracking are attractive research issues in the wireless sensor network (WSN). The paper proposes a fully distributed protocol, CollECT, to event detection and ...
Kuei-Ping Shih, Sheng-Shih Wang, Pao-Hwa Yang, Cha...
CJ
2004
93views more  CJ 2004»
14 years 9 months ago
An Architecture for Kernel-Level Verification of Executables at Run Time
Digital signatures have been proposed by several researchers as a way of preventing execution of malicious code. In this paper we propose a general architecture for performing the...
Luigi Catuogno, Ivan Visconti
ICC
2007
IEEE
132views Communications» more  ICC 2007»
15 years 4 months ago
Quarter Sphere Based Distributed Anomaly Detection in Wireless Sensor Networks
—Anomaly detection is an important challenge for tasks such as fault diagnosis and intrusion detection in energy constrained wireless sensor networks. A key problem is how to min...
Sutharshan Rajasegarar, Christopher Leckie, Marimu...
ICIP
2006
IEEE
15 years 11 months ago
A Boosted Adaptive Particle Filter for Face Detection and Tracking
A novel algorithm, termed a Boosted Adaptive Particle Filter (BAPF), for integrated face detection and face tracking is proposed. The proposed algorithm is based on the synthesis ...
Wenlong Zheng, Suchendra M. Bhandarkar