Sciweavers

1551 search results - page 116 / 311
» Privacy-Preserving Network Aggregation
Sort
View
NCA
2007
IEEE
14 years 4 months ago
Dynamic load balancing for network intrusion detection systems based on distributed architectures
Increasing traffic and the necessity of stateful analyses impose strong computational requirements on network intrusion detection systems (NIDS), and motivate the need of distrib...
Mauro Andreolini, Sara Casolari, Michele Colajanni...
E2EMON
2006
IEEE
14 years 4 months ago
Implementation and Evaluation of a Protocol for Detecting Network-Wide Threshold Crossing Alerts
— Threshold crossing alerts (TCAs) indicate to a management system that a management variable, associated with the state, performance or health of the network, has crossed a cert...
Fetahi Wuhib, Rolf Stadler, Alexander Clemm
INFOCOM
2006
IEEE
14 years 4 months ago
A Statistical Framework for Intrusion Detection in Ad Hoc Networks
— We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically fail to detect attacks and also gener...
Dhanant Subhadrabandhu, Saswati Sarkar, Farooq Anj...
DCOSS
2008
Springer
14 years 5 days ago
Multi-root, Multi-Query Processing in Sensor Networks
Sensor networks can be viewed as large distributed databases, and SQL-like high-level declarative languages can be used for data and information retrieval. Energy constraints make ...
Zhiguo Zhang, Ajay D. Kshemkalyani, Sol M. Shatz
GLOBECOM
2008
IEEE
14 years 4 months ago
Link Rate Allocation under Bandwidth and Energy Constraints in Sensor Networks
—In sensor networks, both energy and bandwidth are scarce resources. In the past, many energy efficient routing algorithms have been devised in order to maximize network lifetim...
Maggie X. Cheng, Xuan Gong, Lin Cai