Sciweavers

258 search results - page 46 / 52
» Real-Time Intrusion Detection for Ad Hoc Networks
Sort
View
ICC
2007
IEEE
108views Communications» more  ICC 2007»
14 years 1 months ago
Trust Establishment in Distributed Networks: Analysis and Modeling
— Recently, trust establishment is recognized as an important approach to defend distributed networks, such as mobile ad hoc networks and sensor networks, against malicious attac...
Yan Lindsay Sun, Yafei Yang
IJHPCA
2002
99views more  IJHPCA 2002»
13 years 7 months ago
Semantic Information Fusion for Coordinated Signal Processing in Mobile Sensor Networks
Distributed cognition of dynamic processes is commonly observed in mobile groups of animates like schools of fish, hunting lions, or in human teams for sports or military maneuvers...
David Friedlander, Shashi Phoha
JSAC
2011
107views more  JSAC 2011»
13 years 2 months ago
Joint Network Capacity Region for Cognitive Networks Heterogeneous Environments and RF-Environment Awareness
In this paper, we characterize the joint network capacity region for a licensed broadcast (primary) and ad hoc cognitive (secondary) network in a heterogeneous environment, includ...
Yuchul Kim, Gustavo de Veciana
SIGMETRICS
2010
ACM
213views Hardware» more  SIGMETRICS 2010»
14 years 10 days ago
Small subset queries and bloom filters using ternary associative memories, with applications
Associative memories offer high levels of parallelism in matching a query against stored entries. We design and analyze an architecture which uses a single lookup into a Ternary C...
Ashish Goel, Pankaj Gupta
NDSS
2006
IEEE
14 years 1 months ago
Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks
The custom, ad hoc nature of web applications makes learning-based anomaly detection systems a suitable approach to provide early warning about the exploitation of novel vulnerabi...
William K. Robertson, Giovanni Vigna, Christopher ...