Sciweavers

614 search results - page 46 / 123
» Intrusion Detection for Routing Attacks in Sensor Networks
Sort
View
GLOBECOM
2008
IEEE
14 years 2 months ago
Securing Time-Synchronization Protocols in Sensor Networks: Attack Detection and Self-Healing
— There have been many time synchronization protocols proposed for sensor networks. However, the issues related with securing such protocols have not received adequate amount of ...
Yafei Yang, Yan Sun
AINA
2008
IEEE
13 years 9 months ago
Monitoring Network Traffic to Detect Stepping-Stone Intrusion
Most network intruders tend to use stepping-stones to attack or to invade other hosts to reduce the risks of being discovered. There have been many approaches that were proposed t...
Jianhua Yang, Byong Lee, Stephen S. H. Huang
ICC
2007
IEEE
113views Communications» more  ICC 2007»
14 years 2 months ago
Detection of Masquerade Attacks on Wireless Sensor Networks
— We propose two lightweight techniques to detect masquerade attacks on wireless sensor networks (WSN). Our solutions take into consideration, important WSN properties like cover...
Vijay Bhuse, Ajay K. Gupta, Ala I. Al-Fuqaha
IJNSEC
2007
119views more  IJNSEC 2007»
13 years 7 months ago
Evolutionary Design of Intrusion Detection Programs
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromis...
Ajith Abraham, Crina Grosan, Carlos Martín-...
CORR
2004
Springer
146views Education» more  CORR 2004»
13 years 7 months ago
ANTIDS: Self-Organized Ant-based Clustering Model for Intrusion Detection System
: Security of computers and the networks that connect them is increasingly becoming of great significance. Computer security is defined as the protection of computing systems again...
Vitorino Ramos, Ajith Abraham