Sciweavers

799 search results - page 105 / 160
» Network anomaly detection based on TCM-KNN algorithm
Sort
View
GLOBECOM
2008
IEEE
14 years 2 months ago
Congestion Avoidance and Fairness in Wireless Sensor Networks
—Designing a sensor network congestion avoidance algorithm is a challenging task due to the application specific nature of these networks. The frequency of event sensing is a de...
Mohammad Z. Ahmad, Damla Turgut
WCNC
2008
IEEE
14 years 2 months ago
Developing Security Solutions for Wireless Mesh Enterprise Networks
—Our study on the deployment topology and communication characteristics of wireless mesh enterprise networks (WMENs) leads to three critical security challenges: (a) deployment o...
Md. Abdul Hamid, Md. Shariful Islam, Choong Seon H...
WORM
2004
13 years 9 months ago
ACT: attachment chain tracing scheme for email virus detection and control
Modern society is highly dependent on the smooth and safe flow of information over communication and computer networks. Computer viruses and worms pose serious threats to the soci...
Jintao Xiong
ICIP
2005
IEEE
14 years 9 months ago
Aircraft detection and tracking using intelligent cameras
Systems that provide ground movement management at airports, maintaining ground safety and increasing air traffic capacity, are called A-SMGCS (Advanced Surface Movement Guidance a...
Kosmas Dimitropoulos, Nikos Grammalidis, Dimitrios...
SOUPS
2010
ACM
13 years 11 months ago
Feasibility of structural network clustering for group-based privacy control in social networks
Users of social networking sites often want to manage the sharing of information and content with different groups of people based on their differing relationships. However, group...
Simon Jones, Eamonn O'Neill