Sciweavers

802 search results - page 146 / 161
» Insider Attacker Detection in Wireless Sensor Networks
Sort
View

Publication
279views
15 years 5 months ago
Potential Networking Applications of Global Positioning Systems (GPS)
Global Positioning System (GPS) Technology allows precise determination of location, velocity, direction, and time. The price of GPS receivers is falling rapidly and the applicatio...
G. Dommety and Raj Jain
CHI
2005
ACM
14 years 8 months ago
Symbolic objects in a networked gestural sound interface
SignalPlay is a sensor-based interactive sound environment in which familiar objects encourage exploration and discovery of sound interfaces through the process of play. Embedded ...
Eric Kabisch, Amanda Williams, Paul Dourish
ICDCS
2010
IEEE
13 years 11 months ago
Sentomist: Unveiling Transient Sensor Network Bugs via Symptom Mining
—Wireless Sensor Network (WSN) applications are typically event-driven. While the source codes of these applications may look simple, they are executed with a complicated concurr...
Yangfan Zhou, Xinyu Chen, Michael R. Lyu, Jiangchu...
ICC
2007
IEEE
179views Communications» more  ICC 2007»
14 years 2 months ago
On Collaboration in a Distributed Multi-Target Tracking Framework
Abstract— A fully-distributed collaborative multi-target tracking framework that eliminates the need for a central data associator or a central coordinating node for wireless sen...
Tolga Onel, Cem Ersoy, Hakan Deliç
GI
2009
Springer
13 years 5 months ago
Service-oriented Event Assessment - Closing the Gap of IT Security Compliance Management
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...