Sciweavers

614 search results - page 98 / 123
» Intrusion Detection for Routing Attacks in Sensor Networks
Sort
View
ADHOC
2007
133views more  ADHOC 2007»
13 years 7 months ago
Secure position-based routing protocol for mobile ad hoc networks
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...
BROADNETS
2006
IEEE
14 years 1 months ago
A Statistical Approach to Anomaly Detection in Interdomain Routing
Abstract— A number of events such as hurricanes, earthquakes, power outages can cause large-scale failures in the Internet. These in turn cause anomalies in the interdomain routi...
Shivani Deshpande, Marina Thottan, Tin Kam Ho, Bip...
ICCS
2007
Springer
14 years 1 months ago
DDDAS/ITR: A Data Mining and Exploration Middleware for Grid and Distributed Computing
We describe our project that marries data mining together with Grid computing. Specifically, we focus on one data mining application - the Minnesota Intrusion Detection System (MIN...
Jon B. Weissman, Vipin Kumar, Varun Chandola, Eric...
SAINT
2008
IEEE
14 years 1 months ago
Dynamic Relay Node Placement in Wireless Sensor Networks
In this paper we present an online algorithm that attacks the problem of placing relay nodes in regions where high localized congestion is detected. Congestion refers to the netwo...
Jorge Mena, Vana Kalogeraki
IWSOS
2009
Springer
14 years 3 days ago
Self-management of Routing on Human Proximity Networks
Abstract. Many modern network applications, including sensor networks and MANETs, have dynamic topologies that reflect processes occurring in the outside world. These dynamic proc...
Graham Williamson, Davide Cellai, Simon A. Dobson,...