Sciweavers

861 search results - page 85 / 173
» Detecting cuts in sensor networks
Sort
View
HICSS
2007
IEEE
222views Biometrics» more  HICSS 2007»
15 years 10 months ago
Battery-Sensing Intrusion Protection for Wireless Handheld Computers Using a Dynamic Threshold Calculation Algorithm for Attack
This paper proposes a pioneering Battery-Sensing Intrusion Protection System (B-SIPS) for mobile computers, which alerts on power changes detected on small wireless devices, using...
Timothy Buennemeyer, Faiz Munshi, Randy C. Marchan...
184
Voted
ESAS
2004
Springer
15 years 7 months ago
Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks
Abstract. The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node ma...
Frank Kargl, Andreas Klenk, Stefan Schlott, Michae...
NDSS
2003
IEEE
15 years 9 months ago
Secure IP Telephony using Multi-layered Protection
This paper presents the design and analysis of a multilayer protection scheme against denial-of-service (DoS) attacks in IP telephony enabled enterprise networks. While there are ...
Brennen Reynolds, Dipak Ghosal
160
Voted
PERCOM
2010
ACM
14 years 10 months ago
Detecting activities from body-worn accelerometers via instance-based algorithms
The automatic and unobtrusive identification of user's activities is one of the challenging goals of context-aware computing. This paper discusses and experimentally evaluate...
Nicola Bicocchi, Marco Mamei, Franco Zambonelli
CDC
2009
IEEE
129views Control Systems» more  CDC 2009»
15 years 8 months ago
Resource allocation for signal detection with active sensors
— We consider the problem of determining the existence of known constant signals over a set of sites, given noisy measurements obtained by a team of active sensors that can switc...
Jerome Le Ny, Michael M. Zavlanos, George J. Pappa...