A new emerging paradigm of Uncertain Risk of Suspicion, Threat and Danger, observed across the field of information security, is described. Based on this paradigm a novel approac...
In this paper, an anomaly detection approach that fuses data gathered from different nodes in a distributed wireless sensor network is proposed and evaluated. The emphasis of this...
Abstract. One of the most challenging applications of wireless networking are in disaster area networks where lack of infrastructure, limited energy resources, need for common oper...
Jordi Cucurull, Mikael Asplund, Simin Nadjm-Tehran...
Keeping people away from litigious information becomes one of the most important research area in network information security. Indeed, Web filtering is used to prevent access to u...
Deployments of wireless LANs consisting of hundreds of 802.11 access points with a large number of users have been reported in enterprises as well as college campuses. However, du...
Anmol Sheth, Christian Doerr, Dirk Grunwald, Richa...