Sciweavers

394 search results - page 4 / 79
» The wireless control network: Monitoring for malicious behav...
Sort
View
SAC
2010
ACM
14 years 3 months ago
Botzilla: detecting the "phoning home" of malicious software
Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...
NOMS
2010
IEEE
172views Communications» more  NOMS 2010»
13 years 7 months ago
WiMFlow: a distributed, self-adaptive architecture for flow monitoring in Wireless Mesh Networks
—We present WiMFlow, a dynamic and self-organized flow monitoring framework in Wireless Mesh Networks. The protocol allows for an autonomic organization of the probes, with the ...
Cristian Popi, Olivier Festor
SIGCOMM
2006
ACM
14 years 2 months ago
Analyzing the MAC-level behavior of wireless networks in the wild
We present Wit, a non-intrusive tool that builds on passive monitoring to analyze the detailed MAC-level behavior of operational wireless networks. Wit uses three processing steps...
Ratul Mahajan, Maya Rodrig, David Wetherall, John ...
COMCOM
2007
149views more  COMCOM 2007»
13 years 8 months ago
Adaptive security design with malicious node detection in cluster-based sensor networks
Distributed wireless sensor networks have problems on detecting and preventing malicious nodes, which always bring destructive threats and compromise multiple sensor nodes. Theref...
Meng-Yen Hsieh, Yueh-Min Huang, Han-Chieh Chao
WS
2004
ACM
14 years 2 months ago
A framework for wireless LAN monitoring and its applications
Many studies on measurement and characterization of wireless LANs (WLANs) have been performed recently. Most of these measurements have been conducted from the wired portion of th...
Jihwang Yeo, Moustafa Youssef, Ashok K. Agrawala