Sciweavers

394 search results - page 15 / 79
» The wireless control network: Monitoring for malicious behav...
Sort
View
DIMVA
2008
13 years 10 months ago
Learning and Classification of Malware Behavior
Malicious software in form of Internet worms, computer viruses, and Trojan horses poses a major threat to the security of networked systems. The diversity and amount of its variant...
Konrad Rieck, Thorsten Holz, Carsten Willems, Patr...
WOWMOM
2006
ACM
110views Multimedia» more  WOWMOM 2006»
14 years 2 months ago
INSIGHT: Internet-Sensor Integration for Habitat Monitoring
We present our experience with designing, developing, and deploying of an Internet accessible wireless sensor network for monitoring temperature, humidity, and illumination of a c...
Murat Demirbas, Ken Yian Chow, Chieh Shyan Wan
ADHOC
2007
131views more  ADHOC 2007»
13 years 8 months ago
Perceptive admission control for wireless network quality of service
As wireless networks become more widely used, there is a growing need to support advanced services, such as multimedia streaming and voice over IP. Traditional approaches to guara...
Ian D. Chakeres, Elizabeth M. Belding-Royer, Josep...
ADHOCNOW
2006
Springer
14 years 2 months ago
Authenticated In-Network Programming for Wireless Sensor Networks
Abstract. Current in-network programming protocols for sensor networks allow an attacker to gain control of the network or disrupt its proper functionality by disseminating malicio...
Ioannis Krontiris, Tassos Dimitriou
APSCC
2008
IEEE
14 years 3 months ago
Algorithms for Transmission Power Control in Biomedical Wireless Sensor Networks
—Wireless sensor networks are increasingly being used for continuous monitoring of patients with chronic health conditions such as diabetes and heart problems. As biomedical sens...
Ashay Dhamdhere, Vijay Sivaraman, Vidit Mathur, Sh...