Sciweavers

462 search results - page 77 / 93
» Challenges in Intrusion Detection for Wireless Ad-hoc Networ...
Sort
View
WSC
2001
13 years 9 months ago
Simulating networks of wireless sensors
Recent advances in low-power embedded processors, radios, and micro-mechanical systems (MEMs) have made possible the development of networks of wirelessly interconnected sensors. ...
Sung Park, Andreas Savvides, Mani B. Srivastava
GLOBECOM
2009
IEEE
14 years 2 months ago
Strong Barrier Coverage with Directional Sensors
Abstract—The barrier coverage model was proposed for applications in which sensors are deployed for intrusion detection. In this paper, we study a strong barrier coverage problem...
Li Zhang, Jian Tang, Weiyi Zhang
WEBI
2009
Springer
14 years 2 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
MOBICOM
2005
ACM
14 years 1 months ago
Barrier coverage with wireless sensors
In old times, castles were surrounded by moats (deep trenches filled with water, and even alligators) to thwart or discourage intrusion attempts. One can now replace such barrier...
Santosh Kumar, Ten-Hwang Lai, Anish Arora
CCR
2006
85views more  CCR 2006»
13 years 8 months ago
Troubleshooting wireless mesh networks
Effective network troubleshooting is critical for maintaining efficient and reliable network operation. Troubleshooting is especially challenging in multi-hop wireless networks be...
Lili Qiu, Paramvir Bahl, Ananth Rao, Lidong Zhou