Sciweavers

394 search results - page 3 / 79
» The wireless control network: Monitoring for malicious behav...
Sort
View
DIMVA
2011
13 years 2 days ago
An Assessment of Overt Malicious Activity Manifest in Residential Networks
While conventional wisdom holds that residential users experience a high degree of compromise and infection, this presumption has seen little validation in the way of an in-depth s...
Gregor Maier, Anja Feldmann, Vern Paxson, Robin So...
VIZSEC
2007
Springer
14 years 2 months ago
Visualization of Host Behavior for Network Security
Monitoring host behavior in a network is one of the most essential tasks in the fields of network monitoring and security since more and more malicious code in the wild internet c...
F. Mansman, L. Meier, Daniel A. Keim
ATAL
2009
Springer
14 years 3 months ago
Comparing trust mechanisms for monitoring aggregator nodes in sensor networks
Sensor nodes are often used to collect data from locations inaccessible or hazardous for humans. As they are not under normal supervision, these nodes are particularly susceptible...
Oly Mistry, Anil Gürsel, Sandip Sen
CORR
2010
Springer
432views Education» more  CORR 2010»
13 years 8 months ago
A Distributed Trust Management Framework for Detecting Malicious Packet Dropping Nodes in a Mobile Ad Hoc Network
In a multi-hop mobile ad hoc network (MANET) mobile nodes communicate with each other forming a cooperative radio network. Security remains a major challenge for these networks du...
Jaydip Sen
SJ
2010
120views more  SJ 2010»
13 years 7 months ago
Rapid Prototyping for Wildlife and Ecological Monitoring
—Wildlife tracking and ecological monitoring are important for scientific monitoring, wildlife rehabilitation, disease control, and sustainable ecological development. Yet techn...
Jyh-How Huang, Ying-Yu Chen, Yu-Te Huang, Po-Yen L...