Sciweavers

6689 search results - page 24 / 1338
» A Network Security Monitor
Sort
View
RAID
2007
Springer
14 years 1 months ago
Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems
We present a novel approach to remote traffic aggregation for Network Intrusion Detection Systems (NIDS) called Cooperative Selective Wormholing (CSW). Our approach works by select...
John R. Lange, Peter A. Dinda, Fabián E. Bu...
IMC
2010
ACM
13 years 5 months ago
Temporally oblivious anomaly detection on large networks using functional peers
Previous methods of network anomaly detection have focused on defining a temporal model of what is "normal," and flagging the "abnormal" activity that does not...
Kevin M. Carter, Richard Lippmann, Stephen W. Boye...
ACIIDS
2009
IEEE
215views Database» more  ACIIDS 2009»
13 years 10 months ago
Proposed Nature Inspired Self-Organized Secure Autonomous Mechanism for WSNs
The field of wireless sensor network (WSN) is an important and challenging research area today. Advancements in sensor networks enable a wide range of environmental monitoring and ...
K. Saleem, Norsheila Fisal, M. S. Abdullah, A. B. ...
EMSOFT
2005
Springer
14 years 1 months ago
Passive mid-stream monitoring of real-time properties
Passive monitoring or testing of complex systems and networks running in the field can provide valuable insights into their behavior in actual environments of use. In certain con...
Lalita Jategaonkar Jagadeesan, Ramesh Viswanathan
CIKM
2009
Springer
14 years 4 days ago
Scalable continuous range monitoring of moving objects in symbolic indoor space
Indoor spaces accommodate large populations of individuals. The continuous range monitoring of such objects can be used as a foundation for a wide variety of applications, e.g., s...
Bin Yang 0002, Hua Lu, Christian S. Jensen