Sciweavers

614 search results - page 73 / 123
» Intrusion Detection for Routing Attacks in Sensor Networks
Sort
View
AI
2008
Springer
14 years 2 months ago
Using Unsupervised Learning for Network Alert Correlation
Alert correlation systems are post-processing modules that enable intrusion analysts to find important alerts and filter false positives efficiently from the output of Intrusion...
Reuben Smith, Nathalie Japkowicz, Maxwell Dondo, P...
PST
2004
13 years 9 months ago
A novel visualization technique for network anomaly detection
Visualized information is a technique that can encode large amounts of complex interrelated data, being at the same time easily quantified, manipulated, and processed by a human us...
Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani
MOBILIGHT
2010
13 years 2 months ago
Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks
Node capture is considered as one of the most critical issues in the security of wireless sensor networks. A popular approach to thwart the problem relies on the detection of event...
Giacomo de Meulenaer, François-Xavier Stand...
DIALM
2005
ACM
203views Algorithms» more  DIALM 2005»
13 years 9 months ago
Topological hole detection in wireless sensor networks and its applications
The identification of holes in a wireless sensor network is of primary interest since the breakdown of sensor nodes in a larger area often indicates one of the special events to ...
Stefan Funke
ADHOC
2007
164views more  ADHOC 2007»
13 years 7 months ago
Attack-resilient time synchronization for wireless sensor networks
The existing time synchronization schemes in sensor networks were not designed with security in mind, thus leaving them vulnerable to security attacks. In this paper, we first id...
Hui Song, Sencun Zhu, Guohong Cao