Sciweavers

74 search results - page 6 / 15
» Detecting Wormhole Attacks in Wireless Networks Using Connec...
Sort
View
MSWIM
2005
ACM
14 years 2 months ago
Decentralized intrusion detection in wireless sensor networks
Wireless sensor networks (WSNs) have many potential applications. Furthermore, in many scenarios WSNs are of interest to adversaries and they become susceptible to some types of a...
Ana Paula R. da Silva, Marcelo H. T. Martins, Brun...
NOMS
2010
IEEE
134views Communications» more  NOMS 2010»
13 years 7 months ago
Packet sampling for worm and botnet detection in TCP connections
—Malware and botnets pose a steady and growing threat to network security. Therefore, packet analysis systems examine network traffic to detect active botnets and spreading worm...
Lothar Braun, Gerhard Münz, Georg Carle
ACISICIS
2005
IEEE
14 years 2 months ago
Security Service Framework for Home Network
Home networking is the collection of elements that process, manage, transport, and store information, enabling the connection and integration of multiple computing, control, monit...
Zhefan Jiang, Sangok Kim, Kanghee Lee, Hyunchul Ba...
HICSS
2007
IEEE
269views Biometrics» more  HICSS 2007»
14 years 2 months ago
Wireless Forensic Analysis Tools for Use in the Electronic Evidence Collection Process
This paper discusses the need for both a series of electronic tools and procedural changes to the evidence collection process to accommodate the possibilities of wireless technolo...
Benjamin Turnbull, Jill Slay
IAW
2003
IEEE
14 years 1 months ago
Wireless Intrusion Detection and Response
— Intrusion detection and countermeasures response is an active area of research. In this paper, we examine integrating an intrusion detection engine with an active countermeasur...
Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. ...