Sciweavers

21 search results - page 3 / 5
» Topology Perturbation for Detecting Malicious Data Injection
Sort
View
IJNSEC
2007
122views more  IJNSEC 2007»
13 years 7 months ago
Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method
This paper analyzes the blackhole attack which is one of the possible attacks in ad hoc networks. In a blackhole attack, a malicious node impersonates a destination node by sendin...
Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abb...
ACSAC
2007
IEEE
14 years 1 months ago
Countering False Accusations and Collusion in the Detection of In-Band Wormholes
Cooperative intrusion detection techniques for MANETs utilize ordinary computing hosts as network intrusion sensors. If compromised, these hosts may inject bogus data into the int...
Daniel Sterne, Geoffrey Lawler, Richard Gopaul, Br...
VLDB
2005
ACM
103views Database» more  VLDB 2005»
14 years 1 months ago
Mapping Maintenance for Data Integration Systems
To answer user queries, a data integration system employs a set of semantic mappings between the mediated schema and the schemas of data sources. In dynamic environments sources o...
Robert McCann, Bedoor K. AlShebli, Quoc Le, Hoa Ng...
IEEEARES
2009
IEEE
14 years 2 months ago
Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring
—Targeting the operating system kernel, the core of trust in a system, kernel rootkits are able to compromise the entire system, placing it under malicious control, while eluding...
Junghwan Rhee, Ryan Riley, Dongyan Xu, Xuxian Jian...
MP
2006
101views more  MP 2006»
13 years 7 months ago
Robust optimization of contaminant sensor placement for community water systems
We present a series of related robust optimization models for placing sensors in municipal water networks to detect contaminants that are maliciously or accidentally injected. We f...
Robert D. Carr, Harvey J. Greenberg, William E. Ha...