Sciweavers

614 search results - page 104 / 123
» Intrusion Detection for Routing Attacks in Sensor Networks
Sort
View
WOWMOM
2006
ACM
110views Multimedia» more  WOWMOM 2006»
14 years 1 months ago
Entrapping Adversaries for Source Protection in Sensor Networks
Sensor networks are used in a variety of application areas for diverse problems from habitat monitoring to military tracking. Whenever they are used to monitor sensitive objects, ...
Yi Ouyang, Zhengyi Le, Guanling Chen, James Ford, ...
NDSS
2005
IEEE
14 years 1 months ago
The Internet Motion Sensor - A Distributed Blackhole Monitoring System
As national infrastructure becomes intertwined with emerging global data networks, the stability and integrity of the two have become synonymous. This connection, while necessary,...
Michael Bailey, Evan Cooke, Farnam Jahanian, Jose ...
COMCOM
2007
129views more  COMCOM 2007»
13 years 7 months ago
Mobile object tracking in wireless sensor networks
— Wireless sensor network is an emerging technology that enables remote monitoring objects and environment. This paper proposes a protocol to track a mobile object in a sensor ne...
Hua-Wen Tsai, Chih-Ping Chu, Tzung-Shi Chen
INCDM
2010
Springer
159views Data Mining» more  INCDM 2010»
14 years 9 days ago
Semi-supervised Learning for False Alarm Reduction
Abstract. Intrusion Detection Systems (IDSs) which have been deployed in computer networks to detect a wide variety of attacks are suffering how to manage of a large number of tri...
Chien-Yi Chiu, Yuh-Jye Lee, Chien-Chung Chang, Wen...
CCS
2004
ACM
14 years 28 days ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash