Sciweavers

462 search results - page 82 / 93
» Challenges in Intrusion Detection for Wireless Ad-hoc Networ...
Sort
View
SIGCOMM
2010
ACM
13 years 8 months ago
NetShield: massive semantics-based vulnerability signature matching for high-speed networks
Accuracy and speed are the two most important metrics for Network Intrusion Detection/Prevention Systems (NIDS/NIPSes). Due to emerging polymorphic attacks and the fact that in ma...
Zhichun Li, Gao Xia, Hongyu Gao, Yi Tang, Yan Chen...
INFOCOM
2010
IEEE
13 years 6 months ago
Spatio-Temporal Fusion for Small-scale Primary Detection in Cognitive Radio Networks
Abstract—In cognitive radio networks (CRNs), detecting smallscale primary devices—such as wireless microphones (WMs)— is a challenging, but very important, problem that has n...
Alexander W. Min, Xinyu Zhang, Kang G. Shin
GLOBECOM
2008
IEEE
13 years 9 months ago
Mobile Solution for Three-Tier Biofeedback Data Acquisition and Processing
— Wireless sensor networks span from military applications into everyday life. Body sensor networks greatly benefit from wireless sensor networks to answer the biofeedback challe...
Orlando R. E. Pereira, Paulo A. C. S. Neves, Joel ...
SENSYS
2003
ACM
14 years 1 months ago
CODA: congestion detection and avoidance in sensor networks
Event-driven sensor networks operate under an idle or light load and then suddenly become active in response to a detected or monitored event. The transport of event impulses is l...
Chieh-Yih Wan, Shane B. Eisenman, Andrew T. Campbe...
WOWMOM
2009
ACM
204views Multimedia» more  WOWMOM 2009»
14 years 23 days ago
ECTC: Energy effiCient topology control algorithm for wireless sensor networks
Sensor network which operates on battery are used to gather data in a variety of environments. The data collected by each node is communicated through the network to the sink, whi...
Nedal Ababneh, Anastasios Viglas, Houda Labiod, Na...