Sciweavers

211 search results - page 4 / 43
» Towards Security Evaluation Based on Evidence Collection
Sort
View
DSN
2004
IEEE
13 years 11 months ago
Intrusion Tolerance and Anti-Traffic Analysis Strategies For Wireless Sensor Networks
Wireless sensor networks face acute security concerns in applications such as battlefield monitoring. A central point of failure in a sensor network is the base station, which act...
Jing Deng, Richard Han, Shivakant Mishra
INFOCOM
2006
IEEE
14 years 1 months ago
Supporting Secure Communication and Data Collection in Mobile Sensor Networks
— Sensor deployments may be static, but researchers have recently been making a case for mobile collector nodes to enhance data acquisition. Since mobile nodes are often more pri...
Li Zhou, Jinfeng Ni, Chinya V. Ravishankar
GIR
2008
ACM
13 years 8 months ago
Evaluating field crisping methods for representing spatial prepositions
There is a need for GIR systems to interpret the vague aspects of spatial language. Here we describe an initial approach towards evaluating crisp realisations of a field-based mo...
Mark M. Hall, Christopher B. Jones
ICCBR
2009
Springer
14 years 2 months ago
Case-Based Collective Inference for Maritime Object Classification
Maritime assets such as merchant and navy ships, ports, and harbors, are targets of terrorist attacks as evidenced by the USS Cole bombing. Conventional methods of securing maritim...
Kalyan Moy Gupta, David W. Aha, Philip Moore
GI
2009
Springer
13 years 5 months ago
Towards the impact of the operational environment on the security of e-voting
Abstract: Our paper deals with the security of operational environments for evoting and its importance for the security of electronic elections. So far the security of e-voting was...
Axel Schmidt, Melanie Volkamer, Lucie Langer, Joha...