Sciweavers

502 search results - page 56 / 101
» A novel visualization technique for network anomaly detectio...
Sort
View
ARC
2006
Springer
122views Hardware» more  ARC 2006»
14 years 23 days ago
UNITE: Uniform Hardware-Based Network Intrusion deTection Engine
Abstract. Current software implementations of network intrusion detection reach a maximum network connection speed of about 1Gbps (Gigabits per second). This paper analyses the Sno...
Sherif Yusuf, Wayne Luk, M. K. N. Szeto, William G...
FCCM
2005
IEEE
102views VLSI» more  FCCM 2005»
14 years 2 months ago
A Signature Match Processor Architecture for Network Intrusion Detection
In this paper, we introduce a novel architecture for a hardware based network intrusion detection system (NIDS). NIDSs are becoming critical components of the network infrastructu...
Janardhan Singaraju, Long Bu, John A. Chandy
CCN
2006
278views Communications» more  CCN 2006»
13 years 10 months ago
Detecting rogue devices in bluetooth networks using radio frequency fingerprinting
Unauthorized Bluetooth devices or rogue devices can impersonate legitimate devices through address and link key spoofing. Moreover, they can infiltrate a Bluetooth network and ini...
Jeyanthi Hall, Michel Barbeau, Evangelos Kranakis
INFOCOM
2009
IEEE
14 years 3 months ago
Robust Event Boundary Detection in Sensor Networks - A Mixture Model Based Approach
—Detecting event frontline or boundary sensors in a complex sensor network environment is one of the critical problems for sensor network applications. In this paper, we propose ...
Min Ding, Xiuzhen Cheng
SMC
2010
IEEE
193views Control Systems» more  SMC 2010»
13 years 7 months ago
A cooperative approach for handshake detection based on body sensor networks
The handshake gesture is an important part of the social etiquette in many cultures. It lies at the core of many human interactions, either in formal or informal settings: exchangi...
Antonio Augimeri, Giancarlo Fortino, Manoj R. Rege...