Sciweavers

CNSR
2008
IEEE
108views Communications» more  CNSR 2008»
14 years 6 months ago
A Novel Covariance Matrix Based Approach for Detecting Network Anomalies
During the last decade, anomaly detection has attracted the attention of many researchers to overcome the weakness of signature-based IDSs in detecting novel attacks. However, hav...
Mahbod Tavallaee, Wei Lu, Shah Arif Iqbal, Ali A. ...
CNSR
2008
IEEE
189views Communications» more  CNSR 2008»
14 years 6 months ago
Secure Health Monitoring Network against Denial-Of-Service Attacks Using Cognitive Intelligence
Secure and energy efficient transmission is a main concern in many wireless sensor network applications. In this paper, two types of denial-of-service attacks that affect the rout...
Rajani Muraleedharan, Lisa Ann Osadciw
CNSR
2008
IEEE
169views Communications» more  CNSR 2008»
14 years 6 months ago
Critical Episode Mining in Intrusion Detection Alerts
One of the most important steps in attack detection using Intrusion Detection Systems (IDSs) is dealing with huge number of alerts that can be either critical single alerts and mu...
Mahboobeh Soleimani, Ali A. Ghorbani
CNSR
2008
IEEE
155views Communications» more  CNSR 2008»
14 years 6 months ago
Detecting Network Anomalies Using Different Wavelet Basis Functions
Signal processing techniques have been applied recently for analyzing and detecting network anomalies due to their potential to find novel or unknown intrusions. In this paper, we...
Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani
CNSR
2008
IEEE
118views Communications» more  CNSR 2008»
14 years 6 months ago
Overall Performance Assessment of Energy-Aware Cooperative Techniques Exploiting Multiple Description and Scalable Video Coding
Abstract— In this paper we develop and analyze energyefficient cooperative techniques for multimedia applications over wireless networks. The composite cellular-short-range netw...
Federico Albiero, Janne Vehkaperä, Marcos D. ...
BROADCOM
2008
IEEE
14 years 6 months ago
A Roadmap to Proliferate Open Source Software Usage within SA Government Servers
Open Source software (OSS) is increasingly being recognized by the government sector around the world as a viable choice to proprietary software, particularly in a number of areas...
Jabu Mtsweni, Elmarie Biermann
BROADCOM
2008
IEEE
14 years 6 months ago
Versatile, Stationary/Mobile Low-Cost Telecommunication System
We describe a low-cost, versatile microstrip antenna to be used for terrestrial to satellite fixed and mobile point to point links at Ku-band. The Ku band has recently attracted a...
Dan Busuioc, Safieddin Safavi-Naeini
BROADCOM
2008
IEEE
14 years 6 months ago
A Routing Metric and Algorithm for IEEE802.16 Mesh Networks
— The rapid growth of high-speed multimedia services for mobile, residential and small business customers has created an increasing demand for last mile broadband access. The wir...
Ntsibane Ntlatlapa
BROADCOM
2008
IEEE
14 years 6 months ago
UnoHop: Efficient Distributed Hash Table with O(1) Lookup Performance
Distributed Hash Tables (DHTs) with O(1) lookup performance strive to minimize the maintenance traffic required for disseminating membership changes information (events). These eve...
Herry Imanta Sitepu, Carmadi Machbub, Armein Z. R....