Sciweavers

194 search results - page 26 / 39
» Wireless Intrusion Detection and Response
Sort
View
ICC
2007
IEEE
143views Communications» more  ICC 2007»
14 years 4 months ago
Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication
Abstract— The wireless medium contains domain-specific information that can be used to complement and enhance traditional security mechanisms. In this paper we propose ways to e...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...
GLOBECOM
2008
IEEE
14 years 4 months ago
Information Theoretic Approach to Signal Feature Detection for Cognitive Radio
—Cognitive radio (CR) systems need to be able to adjust the transceiver characteristics in response to stimuli received from the radio environment. Therefore, monitoring the wire...
Mostafa Z. Afgani, Sinan Sinanovic, Harald Haas
TISSEC
2008
202views more  TISSEC 2008»
13 years 9 months ago
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
compromised sensor nodes. The framework provides an appropriate abstraction of applicationspecific detection mechanisms and models the unique properties of sensor networks. Based o...
Qing Zhang, Ting Yu, Peng Ning
DSS
2000
107views more  DSS 2000»
13 years 9 months ago
MarketNet: protecting access to information systems through financial market controls
This paper describes novel market-based technologies that uniquely establish quantifiable and adjustable limits on the power of attackers, enable verifiable accountability for mal...
Yechiam Yemini, Apostolos Dailianas, Danilo Floris...
CORR
2008
Springer
192views Education» more  CORR 2008»
13 years 8 months ago
Anomaly Detection in Streaming Sensor Data
In this chapter we consider a cell phone network as a set of automatically deployed sensors that records movement and interaction patterns of the population. We discuss methods fo...
Alec Pawling, Ping Yan, Julián Candia, Timo...