Sciweavers

614 search results - page 107 / 123
» Intrusion Detection for Routing Attacks in Sensor Networks
Sort
View
DSN
2007
IEEE
14 years 1 months ago
SLAM: Sleep-Wake Aware Local Monitoring in Sensor Networks
Sleep-wake protocols are critical in sensor networks to ensure long-lived operation. However, an open problem is how to develop efficient mechanisms that can be incorporated with ...
Issa Khalil, Saurabh Bagchi, Ness B. Shroff
IJNSEC
2008
127views more  IJNSEC 2008»
13 years 7 months ago
Inter-domain Routing Stability Dynamics During Infrastructure Stress Events: The Internet Worm Menace
The Internet is crucial to business, government, education and many other facets of society and its continuing scalability places serious challenges on the routing system's c...
Francesco Palmieri
SECON
2008
IEEE
14 years 1 months ago
On the Pitfalls of High-Throughput Multicast Metrics in Adversarial Wireless Mesh Networks
—Recent work in multicast routing for wireless mesh networks has focused on metrics that estimate link quality to maximize throughput. Nodes must collaborate in order to compute ...
Jing Dong, Reza Curtmola, Cristina Nita-Rotaru
NDSS
2009
IEEE
14 years 2 months ago
RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows
Linking network flows is an important problem in intrusion detection as well as anonymity. Passive traffic analysis can link flows but requires long periods of observation to r...
Amir Houmansadr, Negar Kiyavash, Nikita Borisov
ACSAC
2003
IEEE
14 years 24 days ago
Poly2 Paradigm: A Secure Network Service Architecture
General-purpose operating systems provide a rich computing environment both to the user and the attacker. The declining cost of hardware and the growing security concerns of softw...
Eric Bryant, James P. Early, Rajeev Gopalakrishna,...