Sciweavers

394 search results - page 59 / 79
» The wireless control network: Monitoring for malicious behav...
Sort
View
HYBRID
2003
Springer
14 years 1 months ago
Estimation of Distributed Hybrid Systems Using Particle Filtering Methods
Abstract. Networked embedded systems are composed of a large number of components that interact with the physical world via a set of sensors and actuators, have their own computati...
Xenofon D. Koutsoukos, James Kurien, Feng Zhao
BSN
2009
IEEE
211views Sensor Networks» more  BSN 2009»
14 years 1 months ago
TEMPO 3.1: A Body Area Sensor Network Platform for Continuous Movement Assessment
— This work presents TEMPO (Technology-Enabled Medical Precision Observation) 3.1, a third generation body area sensor platform that accurately and precisely captures, processes,...
Adam T. Barth, Mark A. Hanson, Harry C. Powell Jr....
CONEXT
2009
ACM
13 years 9 months ago
ARES: an anti-jamming reinforcement system for 802.11 networks
Dense, unmanaged 802.11 deployments tempt saboteurs into launching jamming attacks by injecting malicious interference. Nowadays, jammers can be portable devices that transmit int...
Konstantinos Pelechrinis, Ioannis Broustis, Srikan...
MMNS
2001
151views Multimedia» more  MMNS 2001»
13 years 10 months ago
Analysis of Random Access Protocol under Bursty Traffic
Aloha-type random-access protocols have been employed as access control protocols in wireline and wireless, stationary and mobile, multiple-access communications networks. They are...
Jianbo Gao, Izhak Rubin
MUE
2008
IEEE
83views Multimedia» more  MUE 2008»
14 years 3 months ago
Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks
Denial of service attacks occur when the attacks are from a single host, whereas distributed denial of service attacks occur when multiple affected systems flood the bandwidth or ...
Chu-Hsing Lin, Jung-Chun Liu, Hsun-Chi Huang, Tsun...