Results 1 - 10
of
798
Performance Anomaly of 802.11b
- In IEEE INFOCOM
, 2003
"... Abstract — We analyze the performance of the IEEE 802.11b wireless local area networks. We have observed that when some mobile hosts use a lower bit rate than the others, the performance of all hosts is considerably degraded. Such a situation is a common case in wireless local area networks in which ..."
Abstract
-
Cited by 431 (11 self)
- Add to MetaCart
repeated unsuccessful frame transmissions are detected. In such a case, a host transmitting for example at 1 Mb/s reduces the throughput of all other hosts transmitting at 11 Mb/s to a low value below 1 Mb/s. The basic CSMA/CA channel access method is at the root of this anomaly: it guarantees an equal
Implementation issues in spectrum sensing for cognitive radios
- in Proc. the 38th. Asilomar Conference on Signals, Systems, and Computers
, 2004
"... Abstract- There are new system implementation challenges involved in the design of cognitive radios, which have both the ability to sense the spectral environment and the flexibility to adapt transmission parameters to maximize system capacity while co-existing with legacy wireless networks. The cri ..."
Abstract
-
Cited by 440 (7 self)
- Add to MetaCart
Abstract- There are new system implementation challenges involved in the design of cognitive radios, which have both the ability to sense the spectral environment and the flexibility to adapt transmission parameters to maximize system capacity while co-existing with legacy wireless networks
A survey on visual surveillance of object motion and behaviors
- IEEE Transactions on Systems, Man and Cybernetics
, 2004
"... Abstract—Visual surveillance in dynamic scenes, especially for humans and vehicles, is currently one of the most active research topics in computer vision. It has a wide spectrum of promising applications, including access control in special areas, human identification at a distance, crowd flux stat ..."
Abstract
-
Cited by 439 (6 self)
- Add to MetaCart
-dimensional tracking, a combination of motion analysis and biometrics, anomaly detection and behavior prediction, content-based retrieval of surveillance videos, behavior understanding and natural language description, fusion of information from multiple sensors, and remote surveillance. Index Terms
Intrusion Detection Techniques for Mobile Wireless Networks
, 2003
"... this paper, we examine the vulnerabilities of wireless networks and argue that we must include intrusion detection in the security architecture for mobile computing environment. We have developed such an architecture and evaluated a key mechanism in this architecture, anomaly detection for mobile ..."
Abstract
-
Cited by 224 (1 self)
- Add to MetaCart
this paper, we examine the vulnerabilities of wireless networks and argue that we must include intrusion detection in the security architecture for mobile computing environment. We have developed such an architecture and evaluated a key mechanism in this architecture, anomaly detection for mobile
A Cooperative Intrusion Detection System for Ad Hoc Networks
, 2003
"... Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years because of the rapid proliferation of wireless devices. MANETs are highly vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, lack of centralized ..."
Abstract
-
Cited by 193 (3 self)
- Add to MetaCart
monitoring and management point, and lack of a clear line of defense. In this paper, we report our progress in developing intrusion detection (ID) capabilities for MANET. Building on our prior work on anomaly detection, we investigate how to improve the anomaly detection approach to provide more details
LAD: Localization anomaly detection for wireless sensor networks
- 886, 2006, special Issue 19th International Parallel and Distributed Processing Symposium - IPDPS
, 2005
"... Abstract — In wireless sensor networks (WSNs), sensors ’ locations play a critical role in many applications. Having a GPS receiver on every sensor node is costly. In the past, a number of location discovery (localization) schemes have been proposed. Most of these schemes share a common feature: the ..."
Abstract
-
Cited by 57 (5 self)
- Add to MetaCart
to detect localization anomalies that are caused by adversaries. Our scheme is independent from the localization schemes. We formulate the problem as an anomaly intrusion detection problem, and we propose a number of ways to detect localization anomalies. We have conducted simulations to evaluate
Anomaly intrusion detection in Wireless Sensor networks
- Journal of High Speed Networks
, 2006
"... Abstract: We propose lightweight methods to detect anomaly intrusions in wireless sensor networks (WSNs). The main idea is to reuse the already available system information that is generated at various layers of a network stack. To the best of our knowledge, this is the first such approach for anoma ..."
Abstract
-
Cited by 51 (2 self)
- Add to MetaCart
Abstract: We propose lightweight methods to detect anomaly intrusions in wireless sensor networks (WSNs). The main idea is to reuse the already available system information that is generated at various layers of a network stack. To the best of our knowledge, this is the first such approach
Distributed Anomaly Detection in Wireless Sensor Networks. To appear
- in Proceedings of Tenth IEEE International Conference on Communications Systems (IEEE ICCS 2006), 30 October-1
, 2006
"... Identifying misbehaviors is an important challenge for monitoring, fault diagnosis and intrusion detection in wireless sensor networks. A key problem is how to minimise the communication overhead and energy consumption in the network when identifying misbehaviors. Our approach to this problem is bas ..."
Abstract
-
Cited by 41 (1 self)
- Add to MetaCart
Identifying misbehaviors is an important challenge for monitoring, fault diagnosis and intrusion detection in wireless sensor networks. A key problem is how to minimise the communication overhead and energy consumption in the network when identifying misbehaviors. Our approach to this problem
Combining filtering and statistical methods for anomaly detection
- In Proceedings of IMC
, 2005
"... In this work we develop an approach for anomaly detection for large scale networks such as that of an enterprize or an ISP. The traffic patterns we focus on for analysis are that of a network-wide view of the traffic state, called the traffic matrix. In the first step a Kalman filter is used to filt ..."
Abstract
-
Cited by 83 (15 self)
- Add to MetaCart
In this work we develop an approach for anomaly detection for large scale networks such as that of an enterprize or an ISP. The traffic patterns we focus on for analysis are that of a network-wide view of the traffic state, called the traffic matrix. In the first step a Kalman filter is used
Characterization of Network-Wide Anomalies in Traffic Flows
- IN ACM/SIGCOMM IMC
, 2004
"... Detecting and understanding anomalies in IP networks is an open and ill-defined problem. Toward this end, we have recently proposed the subspace method for anomaly diagnosis. In this paper we present the first large-scale exploration of the power of the subspace method when applied to flow traffic ..."
Abstract
-
Cited by 101 (4 self)
- Add to MetaCart
Detecting and understanding anomalies in IP networks is an open and ill-defined problem. Toward this end, we have recently proposed the subspace method for anomaly diagnosis. In this paper we present the first large-scale exploration of the power of the subspace method when applied to flow
Results 1 - 10
of
798