In contrast to classic train protection systems where most of the safety measures are built into the rail infrastructure, future versions of the European railway safety system ERT...
Hans Scholten, Roel Westenberg, Manfred Schoemaker
Abstract. Wireless sensor network protocols and applications, including those used for localization, topology control, link scheduling, and link quality estimation, make extensive ...
1 Intrusion detection in MANETs is challenging because these networks change their topologies dynamically; lack concentration points where aggregated traffic can be analyzed; utili...
Daniel F. Sterne, Poornima Balasubramanyam, David ...
A number of protocols have been proposed to date to defend against wormhole attacks in wireless networks by adopting synchronized clocks, positioning devices, or directional antenn...
The problem of biometric sensor interoperability has received limited attention in the literature. Most biometric systems operate under the assumption that the data (viz., images) ...