Sciweavers

361 search results - page 72 / 73
» Attack Detection in Wireless Localization
Sort
View
IFIP
2005
Springer
14 years 29 days ago
Global Internet Routing Forensics: Validation of BGP Paths Using ICMP Traceback
Nearly all network applications rely on the global Internet routing infrastructure to compute routes and deliver packets. Unfortunately, false Internet routes can be maliciously in...
Eunjong Kim, Daniel Massey, Indrajit Ray
VIROLOGY
2010
179views more  VIROLOGY 2010»
13 years 5 months ago
Automatic binary deobfuscation
Abstract. This paper gives an overview of our research in the automation of the process of software protection analysis. We will focus more particularly on the problem of obfuscati...
Yoann Guillot, Alexandre Gazet
CORR
2011
Springer
195views Education» more  CORR 2011»
12 years 11 months ago
Collective response of human populations to large-scale emergencies
Despite recent advances in uncovering the quantitative features of stationary human activity patterns, many applications, from pandemic prediction to emergency response, require a...
James P. Bagrow, Dashun Wang, Albert-Lászl&...
PERCOM
2008
ACM
14 years 1 months ago
WAITER: A Wearable Personal Healthcare and Emergency Aid System
The emerging pervasive computing is regarded as a promising solution to the systems of personal healthcare and emergency aid, which can monitor personal health status in a real-ti...
Wanhong Wu, Jiannong Cao, Yuan Zheng, Yong-Ping Zh...
MOBIQUITOUS
2007
IEEE
14 years 1 months ago
Battery-Aware Embedded GPS Receiver Node
—This paper discusses the design and implementation of an ultra low power embedded GPS receiver node for use in remote monitoring situations where battery life is of the utmost i...
Dejan Raskovic, David Giessel