Sciweavers

483 search results - page 60 / 97
» Patterns of Protocols
Sort
View
HICSS
2009
IEEE
95views Biometrics» more  HICSS 2009»
14 years 2 months ago
Intrusion Monitoring in Process Control Systems
To protect process control networks from cyber intrusions, preventive security measures such as perimeter defenses (for example, network firewalls and demilitarized zones) and se...
Alfonso Valdes, Steven Cheung
ICDCS
2003
IEEE
14 years 1 months ago
Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies
With the proliferation of wireless devices, mobile ad hoc networking (MANET) has become a very exciting and important technology due to its characteristics of open medium and dyna...
Yi-an Huang, Wei Fan, Wenke Lee, Philip S. Yu
ANCS
2007
ACM
13 years 11 months ago
High-speed detection of unsolicited bulk emails
We propose a Progressive Email Classifier (PEC) for highspeed classification of message patterns that are commonly associated with unsolicited bulk email (UNBE). PEC is designed t...
Sheng-Ya Lin, Cheng-Chung Tan, Jyh-Charn Liu, Mich...
DCOSS
2008
Springer
13 years 9 months ago
Efficient Node Discovery in Mobile Wireless Sensor Networks
Energy is one of the most crucial aspects in real deployments of mobile sensor networks. As a result of scarce resources, the duration of most real deployments can be limited to ju...
Vladimir Dyo, Cecilia Mascolo
MASCOTS
2001
13 years 9 months ago
Parameterized Mobile Action Generator for a Wireless PCS Network
While there are different research groups in the mobile computing community, most research requires mobile action data in terms of user calling and mobility patterns. Since collec...
Sang-Eon Park, Carla N. Purdy