Sciweavers

614 search results - page 93 / 123
» Intrusion Detection for Routing Attacks in Sensor Networks
Sort
View
ACSAC
2001
IEEE
13 years 11 months ago
Java Security Extensions for a Java Server in a Hostile Environment
The Java (TM) Virtual Machine is being used more frequently as the basic engine behind dynamic web services. With the proliferation of network attacks on these network resources, ...
David M. Wheeler, Adam Conyers, Jane Luo, Alex Xio...
PDP
2009
IEEE
14 years 2 months ago
BitTorrent Worm Sensor Network : P2P Worms Detection and Containment
- Peer-to-peer (p2p) networking technology has gained popularity as an efficient mechanism for users to obtain free services without the need for centralized servers. Protecting th...
Sinan Hatahet, Yacine Challal, Abdelmadjid Bouabda...
JSAC
2006
167views more  JSAC 2006»
13 years 7 months ago
Secure and resilient clock synchronization in wireless sensor networks
Abstract--Wireless sensor networks have received a lot of attention recently due to its wide applications. An accurate and synchronized clock time is crucial in many sensor network...
Kun Sun, Peng Ning, Cliff Wang
SRDS
2007
IEEE
14 years 1 months ago
Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks
Sensors that operate in an unattended, harsh or hostile environment are vulnerable to compromises because their low costs preclude the use of expensive tamper-resistant hardware. ...
Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao
INFOCOM
2012
IEEE
11 years 10 months ago
Di-Sec: A distributed security framework for heterogeneous Wireless Sensor Networks
Wireless Sensor Networks (WSNs) are no longer a nascent technology and today, they are actively deployed as a viable technology in many diverse application domains such as health ...
Marco Valero, Sang Shin Jung, A. Selcuk Uluagac, Y...