Sciweavers

614 search results - page 108 / 123
» Intrusion Detection for Routing Attacks in Sensor Networks
Sort
View
SIGCOMM
2010
ACM
13 years 7 months ago
NetShield: massive semantics-based vulnerability signature matching for high-speed networks
Accuracy and speed are the two most important metrics for Network Intrusion Detection/Prevention Systems (NIDS/NIPSes). Due to emerging polymorphic attacks and the fact that in ma...
Zhichun Li, Gao Xia, Hongyu Gao, Yi Tang, Yan Chen...
INFOCOM
2010
IEEE
13 years 6 months ago
Adaptive Calibration for Fusion-based Wireless Sensor Networks
Abstract—Wireless sensor networks (WSNs) are typically composed of low-cost sensors that are deeply integrated with physical environments. As a result, the sensing performance of...
Rui Tan, Guoliang Xing, Xue Liu, Jianguo Yao, Zhao...
CCE
2007
13 years 7 months ago
Water networks security: A two-stage mixed-integer stochastic program for sensor placement under uncertainty
This work describes a stochastic approach for the optimal placement of sensors in municipal water networks to detect maliciously injected contaminants. The model minimizes the exp...
Vicente Rico-Ramírez, Sergio Frausto-Hern&a...
IFIP
2005
Springer
14 years 1 months ago
Global Internet Routing Forensics: Validation of BGP Paths Using ICMP Traceback
Nearly all network applications rely on the global Internet routing infrastructure to compute routes and deliver packets. Unfortunately, false Internet routes can be maliciously in...
Eunjong Kim, Daniel Massey, Indrajit Ray
AMCS
2010
146views Mathematics» more  AMCS 2010»
13 years 7 months ago
Sensor network design for the estimation of spatially distributed processes
satisfactory network connectivity have dominated this line of research and abstracted away from the mathematical description of the physical processes underlying the observed pheno...
Dariusz Ucinski, Maciej Patan