Sciweavers

464 search results - page 68 / 93
» Detecting the number of signals in wireless DS-CDMA networks
Sort
View
ACSAC
2004
IEEE
13 years 11 months ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
ICASSP
2008
IEEE
14 years 2 months ago
Optimized distributed 2D transforms for irregularly sampled sensor network grids using wavelet lifting
We address the design and optimization of an energy-efficient lifting-based 2D transform for wireless sensor networks with irregular spatial sampling. The 2D transform is designe...
Godwin Shen, Antonio Ortega
TON
2012
11 years 10 months ago
A New Cell-Counting-Based Attack Against Tor
Abstract—Various low-latency anonymous communication systems such as Tor and Anonymizer have been designed to provide anonymity service for users. In order to hide the communicat...
Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xu...
DCOSS
2007
Springer
13 years 11 months ago
Efficient Computation of Minimum Exposure Paths in a Sensor Network Field
The exposure of a path p is a measure of the likelihood that an object traveling along p is detected by a network of sensors and it is formally defined as an integral over all poin...
Hristo Djidjev
INFOCOM
2010
IEEE
13 years 6 months ago
Deploying Mesh Nodes under Non-Uniform Propagation
Abstract—Wireless mesh networks are popular as a costeffective means to provide broadband connectivity to large user populations. A mesh network placement provides coverage, such...
Joshua Robinson, Mohit Singh, Ram Swaminathan, Edw...