Sciweavers

708 search results - page 78 / 142
» On the Use of Word Networks to Mimicry Attack Detection
Sort
View
CCS
2005
ACM
14 years 2 months ago
Modeling insider attacks on group key-exchange protocols
Protocols for authenticated key exchange (AKE) allow parties within an insecure network to establish a common session key which can then be used to secure their future communicati...
Jonathan Katz, Ji Sun Shin
DIMVA
2008
13 years 10 months ago
FluXOR: Detecting and Monitoring Fast-Flux Service Networks
Botnets are large groups of compromised machines (bots) used by miscreants for the most illegal activities (e.g., sending spam emails, denial-of-service attacks, phishing and other...
Emanuele Passerini, Roberto Paleari, Lorenzo Marti...
DCOSS
2008
Springer
13 years 10 months ago
SAKE: Software Attestation for Key Establishment in Sensor Networks
Abstract. This paper presents a protocol called SAKE (Software Attestation for Key Establishment), for establishing a shared key between any two neighboring nodes of a sensor netwo...
Arvind Seshadri, Mark Luk, Adrian Perrig
ICASSP
2008
IEEE
14 years 3 months ago
Energy efficient change detection over a MAC using physical layer fusion
We propose a simple and energy efficient distributed Change Detection scheme for sensor networks based on Page’s parametric CUSUM algorithm. The sensor observations are IID ove...
Taposh Banerjee, Veeraruna Kavitha, Vinod Sharma
NN
2008
Springer
114views Neural Networks» more  NN 2008»
13 years 8 months ago
Event detection and localization for small mobile robots using reservoir computing
Reservoir Computing (RC) techniques use a fixed (usually randomly created) recurrent neural network, or more generally any dynamic system, which operates at the edge of stability,...
Eric A. Antonelo, Benjamin Schrauwen, Dirk Strooba...