—The trends for pushing more operational intelligence towards network elements to achieve more context-aware and self-managing behavior often requires elements to gather network ...
John Keeney, David Lewis, Declan O'Sullivan, Antoi...
In this chapter we consider a cell phone network as a set of automatically deployed sensors that records movement and interaction patterns of the population. We discuss methods fo...
Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous acce...
Recent years have witnessed the pilot deployments of audio or low-rate video wireless sensor networks for a class of mission-critical applications including search and rescue, sec...
Distributed network intrusion detection systems which incorporate tens, hundreds, even thousands, of sensors are becoming increasing popular. Managing and presenting the informati...
John C. McEachen, Cheng Kah Wai, Vonda L. Olsavsky