Sciweavers

516 search results - page 88 / 104
» Anonymous Data Collection in Sensor Networks
Sort
View
SP
2005
IEEE
156views Security Privacy» more  SP 2005»
14 years 29 days ago
Distributed Detection of Node Replication Attacks in Sensor Networks
The low-cost, off-the-shelf hardware components in unshielded sensor-network nodes leave them vulnerable to compromise. With little effort, an adversary may capture nodes, analyze...
Bryan Parno, Adrian Perrig, Virgil D. Gligor
IWEC
2008
13 years 8 months ago
Game-Based Simulation for the Evaluation of Threat Detection in a Seaport Environment
The ability to simulate a seaport environment, including illicit cargo and the sensors designed to detect such cargo, allows the evaluation of alternative detection methods in orde...
Allen Christiansen, Damian Johnson, Lawrence B. Ho...
ICDM
2010
IEEE
216views Data Mining» more  ICDM 2010»
13 years 5 months ago
Data Editing Techniques to Allow the Application of Distance-Based Outlier Detection to Streams
The problem of finding outliers in data has broad applications in areas as diverse as data cleaning, fraud detection, network monitoring, invasive species monitoring, etc. While th...
Vit Niennattrakul, Eamonn J. Keogh, Chotirat Ann R...
JFR
2010
59views more  JFR 2010»
13 years 2 months ago
A robotic system for monitoring carp in Minnesota lakes
Robotic Sensor Networks (RSNs) find increasing use in environmental monitoring as RSNs can collect data from obscure, hard-to-reach places over long periods of time. This work rep...
Pratap Tokekar, Deepak Bhadauria, Andrew Studenski...
ACC
2011
65views more  ACC 2011»
12 years 7 months ago
Measuring the Deployment Hiccups of DNSSEC
On May 5, 2010 the last step of the DNSSEC deployment on the 13 root servers was completed. DNSSEC is a set of security extensions on the traditional DNS protocol, that aim in prev...
Vasilis Pappas, Angelos D. Keromytis