Sciweavers

1244 search results - page 222 / 249
» Network Intrusion Detection System with Data Mart
Sort
View
139
Voted
OTM
2009
Springer
15 years 10 months ago
An Architecture for Dynamic Trust Monitoring in Mobile Networks
Collusion attacks remain a major problem of reputation and trust models, in mobile ad hoc networks. By covering up malicious behaviour of one another from the remaining part of the...
Olufunmilola Onolaja, Rami Bahsoon, Georgios Theod...
129
Voted
SAINT
2009
IEEE
15 years 10 months ago
Understanding the Challenges in Securing Internet Routing
The Internet routing system plays an essential role of glueing together tens of thousands of individual networks to create a global data delivery substrate. Over the years many ef...
Ricardo V. Oliveira, Mohit Lad, Lixia Zhang
UAI
2004
15 years 5 months ago
Bayesian Biosurveillance of Disease Outbreaks
Early, reliable detection of disease outbreaks is a critical problem today. This paper reports an investigation of the use of causal Bayesian networks to model spatio-temporal pat...
Gregory F. Cooper, Denver Dash, John Levander, Wen...
SASN
2006
ACM
15 years 10 months ago
A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks
This paper focuses on defending against compromised nodes’ dropping of legitimate reports and investigates the misbehavior of a maliciously packet-dropping node in sensor networ...
Suk-Bok Lee, Yoon-Hwa Choi
153
Voted
TKDE
2010
152views more  TKDE 2010»
15 years 2 months ago
Maintaining Recursive Views of Regions and Connectivity in Networks
— The data management community has recently begun to consider declarative network routing and distributed acquisition: e.g., sensor networks that execute queries about contiguou...
Mengmeng Liu, Nicholas E. Taylor, Wenchao Zhou, Za...