Sciweavers

511 search results - page 67 / 103
» Anomaly-Based Intrusion Detection Algorithms for Wireless Ne...
Sort
View
ALGOSENSORS
2009
Springer
14 years 2 months ago
Self-stabilizing Deterministic Gathering
Abstract. In this paper, we investigate the possibility to deterministically solve the gathering problem (GP) with weak robots (anonymous, autonomous, disoriented, deaf and dumb, a...
Yoann Dieudonné, Franck Petit
NETWORKING
2010
13 years 9 months ago
Bidirectional Range Extension for TCAM-Based Packet Classification
Abstract. Packet classification is a fundamental task for network devices such as edge routers, firewalls, and intrusion detection systems. Currently, most vendors use Ternary Cont...
Yan Sun, Min Sik Kim
JCIT
2010
172views more  JCIT 2010»
13 years 2 months ago
Conditional Sensor Deployment Using Evolutionary Algorithms
Sensor deployment is a critical issue, as it affects the cost and detection capabilities of a wireless sensor network. Although many previous efforts have addressed this issue, mo...
M. Sami Soliman, Guanzheng Tan
FGCN
2007
IEEE
127views Communications» more  FGCN 2007»
14 years 2 months ago
A Survey of Routing Protocols for Energy Constrained Ad Hoc Wireless Networks
In this survey we review energy-aware routing protocols for wireless multihop ad hoc networks and critically discuss the main results in this area. The classification presented is...
Natalia Vassileva, Francisco Barceló-Arroyo
WWIC
2007
Springer
221views Communications» more  WWIC 2007»
14 years 1 months ago
Detection of Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks
Mobile Ad Hoc networks (MANETs) are susceptible to having their effective operation compromised by a variety of security attacks. Nodes may misbehave either because they are malici...
Oscar F. Gonzalez, Michael P. Howarth, George Pavl...