Abstract—The extensive recent research in protocols development for wireless networks must be complemented with simple yet efficient prototyping and evaluation mechanism. MiNT-2...
Vikram P. Munishwar, Shailendra Singh 0003, Xiaosh...
—One of the central areas in network intrusion detection is how to build effective systems that are able to distinguish normal from intrusive traffic. In this paper we explore t...
In this paper we present a system for off-line signature verification. The paper’s contributions are: i) Five distances were calculated and evaluated over the signature databas...
Milena R. P. Souza, Leandro R. Almeida, George D. ...
Abstract--We present a new scheme to reduce the end-toend routing delay in the mission-critical applications of the wireless sensor networks (WSNs) under the duty cycle model. Whil...
Wireless networks are being integrated into the modern automobile. The security and privacy implications of such in-car networks, however, are not well understood as their transmi...
Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis T...