Sciweavers

511 search results - page 61 / 103
» Anomaly-Based Intrusion Detection Algorithms for Wireless Ne...
Sort
View
ISCC
2009
IEEE
254views Communications» more  ISCC 2009»
14 years 2 months ago
Monitoring connectivity in wireless sensor networks
It is important to have continuous connectivity in a wireless sensor network after it is deployed in a hostile environment. However, such networks are constrained by the low usert...
Benahmed Khelifa, Hafid Haffaf, Madjid Merabti, Da...
SIGMOD
2001
ACM
142views Database» more  SIGMOD 2001»
14 years 7 months ago
Outlier Detection for High Dimensional Data
The outlier detection problem has important applications in the eld of fraud detection, network robustness analysis, and intrusion detection. Most such applications are high dimen...
Charu C. Aggarwal, Philip S. Yu
CCS
2004
ACM
14 years 1 months ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash
GISCIENCE
2008
Springer
112views GIS» more  GISCIENCE 2008»
13 years 8 months ago
Decentralized Movement Pattern Detection amongst Mobile Geosensor Nodes
Movement patterns, like flocking and converging, leading and following, are examples of high-level process knowledge derived from lowlevel trajectory data. Conventional techniques...
Patrick Laube, Matt Duckham, Thomas Wolle
MOBIHOC
2007
ACM
14 years 7 months ago
Outlier detection in sensor networks
Outlier detection has many important applications in sensor networks, e.g., abnormal event detection, animal behavior change, etc. It is a difficult problem since global informati...
Bo Sheng, Qun Li, Weizhen Mao, Wen Jin