Sciweavers

462 search results - page 50 / 93
» Challenges in Intrusion Detection for Wireless Ad-hoc Networ...
Sort
View
AINA
2009
IEEE
14 years 1 months ago
Correlating TCP/IP Interactive Sessions with Correlation Coefficient to Detect Stepping-Stone Intrusion
-- Most network intruders launch their attacks through stepping-stones to reduce the risks of being discovered. To uncover such intrusions, one prevalent, challenging, and critical...
Guoqing Zhao, Jianhua Yang, Gurdeep S. Hura, Long ...
MOBIMEDIA
2007
13 years 9 months ago
Cooperative caching in wireless multimedia sensor networks
The recent advances in miniaturization and the creation of low-power circuits, combined with small-sized batteries have made the development of wireless sensor networks a working ...
Nikos Dimokas, Dimitrios Katsaros, Yannis Manolopo...
MOBIHOC
2001
ACM
14 years 7 months ago
Localized algorithms in wireless ad-hoc networks: location discovery and sensor exposure
The development of practical, localized algorithms is probably the most needed and most challenging task in wireless ad-hoc sensor networks (WASNs). Localized algorithms are a spe...
Seapahn Meguerdichian, Sasha Slijepcevic, Vahag Ka...
ALGOSENSORS
2007
Springer
13 years 9 months ago
Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks
Abstract. In this paper, we present an Intrusion Detection System designed for wireless sensor networks and show how it can be configured to detect Sinkhole attacks. A Sinkhole at...
Ioannis Krontiris, Tassos Dimitriou, Thanassis Gia...
SIGMOD
2001
ACM
165views Database» more  SIGMOD 2001»
14 years 8 months ago
Mining System Audit Data: Opportunities and Challenges
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
Wenke Lee, Wei Fan