Sciweavers

769 search results - page 80 / 154
» Building Intrusion Detection with a Wireless Sensor Network
Sort
View
115
Voted
IJSNET
2008
126views more  IJSNET 2008»
15 years 3 months ago
Minimising the effect of WiFi interference in 802.15.4 wireless sensor networks
: Interference from colocated networks operating over the same frequency range, becomes an increasingly severe problem as the number of networks overlapping geographically increase...
Razvan Musaloiu-Elefteri, Andreas Terzis
153
Voted
AIMS
2008
Springer
15 years 10 months ago
Towards Resilient Community Wireless Mesh Networks
Abstract. Wireless Mesh Networks are an increasingly common technology providing connectivity in many communities, particularly where Internet access is unavailable or restricted v...
Sara Bury, Nicholas J. P. Race
142
Voted
PERCOM
2007
ACM
16 years 3 months ago
Structural Learning of Activities from Sparse Datasets
Abstract. A major challenge in pervasive computing is to learn activity patterns, such as bathing and cleaning from sensor data. Typical sensor deployments generate sparse datasets...
Fahd Albinali, Nigel Davies, Adrian Friday
139
Voted
JNSM
2008
93views more  JNSM 2008»
15 years 3 months ago
Optimal IDS Sensor Placement and Alert Prioritization Using Attack Graphs
We optimally place intrusion detection system (IDS) sensors and prioritize IDS alerts using attack graph analysis. We begin by predicting all possible ways of penetrating a networ...
Steven Noel, Sushil Jajodia
130
Voted
ADHOC
2007
164views more  ADHOC 2007»
15 years 3 months ago
Attack-resilient time synchronization for wireless sensor networks
The existing time synchronization schemes in sensor networks were not designed with security in mind, thus leaving them vulnerable to security attacks. In this paper, we first id...
Hui Song, Sencun Zhu, Guohong Cao