Sciweavers

422 search results - page 68 / 85
» Identity-based attack detection in mobile wireless networks
Sort
View
MOBICOM
2010
ACM
13 years 7 months ago
ZiFi: wireless LAN discovery via ZigBee interference signatures
WiFi networks have enjoyed an unprecedent penetration rate in recent years. However, due to the limited coverage, existing WiFi infrastructure only provides intermittent connectiv...
Ruogu Zhou, Yongping Xiong, Guoliang Xing, Limin S...
AAAI
2006
13 years 9 months ago
A Manifold Regularization Approach to Calibration Reduction for Sensor-Network Based Tracking
The ability to accurately detect the location of a mobile node in a sensor network is important for many artificial intelligence (AI) tasks that range from robotics to context-awa...
Jeffrey Junfeng Pan, Qiang Yang, Hong Chang, Dit-Y...
WMASH
2004
ACM
14 years 1 months ago
Reputation-based Wi-Fi deployment protocols and security analysis
In recent years, wireless Internet service providers (WISPs) have established thousands of WiFi hot spots in cafes, hotels and airports in order to offer to travelling Internet u...
Naouel Ben Salem, Jean-Pierre Hubaux, Markus Jakob...
CORR
2010
Springer
132views Education» more  CORR 2010»
13 years 5 months ago
New Frontiers of Network Security: The Threat Within
Nearly 70% of information security threats originate from inside the organization. The instances of insider threats have been increasing at an alarming rate with the latest trends ...
Sugata Sanyal, Ajit Shelat, Amit Gupta
GLOBECOM
2009
IEEE
14 years 2 months ago
Lightweight Jammer Localization in Wireless Networks: System Design and Implementation
—Jamming attacks have become prevalent during the last few years, due to the shared nature and the open access to the wireless medium. Finding the location of a jamming device is...
Konstantinos Pelechrinis, Iordanis Koutsopoulos, I...