Sciweavers

1551 search results - page 172 / 311
» Privacy-Preserving Network Aggregation
Sort
View
CIA
2008
Springer
14 years 5 days ago
Trust-Based Classifier Combination for Network Anomaly Detection
Abstract. We present a method that improves the results of network intrusion detection by integration of several anomaly detection algorithms through trust and reputation models. O...
Martin Rehák, Michal Pechoucek, Martin Gril...
ICWN
2008
13 years 11 months ago
Coverage Efficient Clustering Method Based on Time Delay for Wireless Sensor Networks
Energy efficient operations are essential to increase the lifetime of wireless sensor network. A clustering-based protocol is one approach that reduces energy by a data aggregation...
Ji Gong, Hyuntae Kim, Gihwan Cho
CCR
2010
133views more  CCR 2010»
13 years 10 months ago
The role of network trace anonymization under attack
In recent years, academic literature has analyzed many attacks on network trace anonymization techniques. These attacks usually correlate external information with anonymized data...
Martin Burkhart, Dominik Schatzmann, Brian Trammel...
CORR
2010
Springer
102views Education» more  CORR 2010»
13 years 10 months ago
Detecting Weak but Hierarchically-Structured Patterns in Networks
The ability to detect weak distributed activation patterns in networks is critical to several applications, such as identifying the onset of anomalous activity or incipient conges...
Aarti Singh, Robert D. Nowak, A. Robert Calderbank
JCP
2008
121views more  JCP 2008»
13 years 10 months ago
Fuzzy Logic Bandwidth Prediction and Policing in a DiffServ-Aware Network
Differentiated Services (DiffServ)-aware network potentially can provide the next generation platform for multimedia support in the Internet. In this work we look at improving band...
Norashidah Md Din, Norsheila Fisal