Sciweavers

802 search results - page 148 / 161
» Insider Attacker Detection in Wireless Sensor Networks
Sort
View
PERCOM
2005
ACM
14 years 1 months ago
Design and Implementation of "kubit" for Sensing and Control Ubiquitous Applications
Towards the wide acceptance of ubiquitous networking, practical and deployable ubiquitous applications must be provided in a concrete and easily understandable form to end-users. ...
Kiyohito Yoshihara, Shinji Motegi, Hiroki Horiuchi
PODC
2009
ACM
14 years 8 months ago
Coloring unstructured wireless multi-hop networks
We present a randomized coloring algorithm for the unstructured radio network model, a model comprising autonomous nodes, asynchronous wake-up, no collision detection and an unkno...
Johannes Schneider, Roger Wattenhofer
DSN
2009
IEEE
14 years 2 months ago
Comparing anomaly-detection algorithms for keystroke dynamics
Keystroke dynamics—the analysis of typing rhythms to discriminate among users—has been proposed for detecting impostors (i.e., both insiders and external attackers). Since man...
Kevin S. Killourhy, Roy A. Maxion
PERCOM
2007
ACM
14 years 7 months ago
SOS: Secure Overlay Sensornets
Overlay Networks (ONs) are logical networks built on top of a physical network with the aim of moving part of the routing complexity to the application layer. At the same time, sen...
Leonardo B. Oliveira, Antonio Alfredo Ferreira Lou...
JCST
2010
119views more  JCST 2010»
13 years 6 months ago
Location, Localization, and Localizability
Abstract Location-aware technology spawns numerous unforeseen pervasive applications in a wide range of living, production, commence, and public services. This article provides an ...
Yunhao Liu, Zheng Yang, Xiaoping Wang, Lirong Jian