Sciweavers

37 search results - page 5 / 8
» Decorrelating wireless sensor network traffic to inhibit tra...
Sort
View
SP
2002
IEEE
13 years 7 months ago
Stateful Intrusion Detection for High-Speed Networks
As networks become faster there is an emerging need for security analysis techniques that can keep up with the increased network throughput. Existing network-based intrusion detec...
Christopher Krügel, Fredrik Valeur, Giovanni ...
RAID
2000
Springer
13 years 11 months ago
Adaptive, Model-Based Monitoring for Cyber Attack Detection
Inference methods for detecting attacks on information resources typically use signature analysis or statistical anomaly detection methods. The former have the advantage of attack...
Alfonso Valdes, Keith Skinner
ICDE
2008
IEEE
100views Database» more  ICDE 2008»
14 years 8 months ago
Mobile Filter: Exploring Migration of Filters for Error-Bounded Data Collection in Sensor Networks
In wireless sensor networks, filters, which suppress data update reports within predefined error bounds, effectively reduce the traffic volume for continuous data collection. All p...
Dan Wang, Jianliang Xu, Jiangchuan Liu, Feng Wang
PERCOM
2007
ACM
14 years 7 months ago
Practical Exploitation of the Energy-Latency Tradeoff for Sensor Network Broadcast
As devices become more reliant on battery power, it is essential to design energy efficient protocols. While there is a vast amount of research into power save protocols for unicas...
Matthew J. Miller, Indranil Gupta
TPDS
2008
183views more  TPDS 2008»
13 years 7 months ago
Avoiding Energy Holes in Wireless Sensor Networks with Nonuniform Node Distribution
In this paper, we investigate the theoretical aspects of the nonuniform node distribution strategy used to mitigate the energy hole problem in wireless sensor networks (WSNs). We c...
Xiaobing Wu, Guihai Chen, Sajal K. Das