This research investigates the automation of security assessment of the static and dynamic properties of cyberinfrastructures, with emphasis on the electrical power grid. We descr...
We present a novel outlier elimination technique designed for sensor networks. This technique is called RANBAR and it is based on the RANSAC (RANdom SAmple Consensus) paradigm, wh...
Pervasive surveillance implies the continuous tracking of multiple targets as they move about the monitored region. The tasks to be performed by a surveillance system are expresse...
Amit Goradia, Zhiwei Cen, Clayton Haffner, Ning Xi...
Security researchers and network operators increasingly rely on information gathered from honeypots and sensors deployed on darknets, or unused address space, for attack detection....
Abstract--Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sn...