Sciweavers

92 search results - page 14 / 19
» Minimizing Expected Attacking Cost in Networks
Sort
View
PADS
2005
ACM
14 years 1 months ago
Requirements on Worm Mitigation Technologies in MANETS
This study presents an analysis of the impact of mitigation on computer worm propagation in Mobile Ad-hoc Networks (MANETS). According to the recent DARPA BAA Defense Against Cybe...
Robert G. Cole, Nam Phamdo, Moheeb Abu Rajab, Andr...
TPDS
2010
89views more  TPDS 2010»
13 years 6 months ago
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage in Sensor Networks
—Various sensor types, e.g., temperature, humidity, and acoustic, sense physical phenomena in different ways, and thus, are expected to have different sensing models. Even for th...
Mohamed Hefeeda, Hossein Ahmadi
CDC
2009
IEEE
122views Control Systems» more  CDC 2009»
13 years 9 months ago
Dynamic policy-based IDS configuration
Intrusion Detection System (IDS) is an important security enforcement tool in modern networked information systems. Obtaining an optimal IDS configuration for effective detection o...
Quanyan Zhu, Tamer Basar
DCC
2009
IEEE
14 years 8 months ago
Optimization of Correlated Source Coding for Event-Based Monitoring in Sensor Networks
Motivated by the paradigm of event-based monitoring, which can potentially alleviate the inherent bandwidth and energy constraints associated with wireless sensor networks, we con...
Jaspreet Singh, Ankur Saxena, Kenneth Rose, Upaman...
INFOCOM
2009
IEEE
14 years 2 months ago
Budget-Based Self-Optimized Incentive Search in Unstructured P2P Networks
—Distributed object search is the primary function of Peer-to-Peer (P2P) file sharing system to locate and transfer the file. The predominant search schemes in unstructured P2P...
Yi Hu, Min Feng, Laxmi N. Bhuyan, Vana Kalogeraki