• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 290
Next 10 →

Searching for Mobile Intruders in a Polygonal Region by a Group of Mobile Searchers

by Masafumi Yamashita, Hideki Umemoto, Ichiro Suzuki, Tsunehiko Kameda - SIAM JOURNAL ON COMPUTING
"... The problem of searching for mobile intruders in a polygonal region by mobile searchers is considered. A searcher can move continuously inside a polygon holding a flashlight that emits a single ray of light whose direction can be changed continuously. The visibility of a searcher at any time instant ..."
Abstract - Cited by 156 (3 self) - Add to MetaCart
The problem of searching for mobile intruders in a polygonal region by mobile searchers is considered. A searcher can move continuously inside a polygon holding a flashlight that emits a single ray of light whose direction can be changed continuously. The visibility of a searcher at any time

ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD

by G Pradeep Kumar , R Chakkaravarthy , S Arun Kishorre , L S Sathiyamurthy
"... ABSTRACT: Wireless sensor networks are nowadays widely popular and has become an integral part in the military ..."
Abstract - Add to MetaCart
ABSTRACT: Wireless sensor networks are nowadays widely popular and has become an integral part in the military

Capture of an Intruder by Mobile Agents

by Lali Barrière, Paola Flocchini, Pierre Fraigniaud, Nicola Santoro , 2002
"... Consider a team of mobile software agents deployed to capture a (possibly hostile) intruder in a network. All agents, including the intruder move along the network links; the intruder could be arbitrarily fast, and aware of the positions of all the agents. The problem is to design the agents' s ..."
Abstract - Cited by 69 (22 self) - Add to MetaCart
Consider a team of mobile software agents deployed to capture a (possibly hostile) intruder in a network. All agents, including the intruder move along the network links; the intruder could be arbitrarily fast, and aware of the positions of all the agents. The problem is to design the agents

A Method of Tracing Intruders by Use of Mobile Agents

by Midori Asaka, Shunji Okazawa, Atsushi Taguchi, Shigeki GOTO , 1999
"... . A network intrusion detection system (IDA) retrieves information related to intrusions from target systems across the network by using mobile agents. Simultaneously, the agents trace the intruders. IDA detects intrusions based on information collected and the route of intrusion. This paper ma ..."
Abstract - Cited by 24 (0 self) - Add to MetaCart
. A network intrusion detection system (IDA) retrieves information related to intrusions from target systems across the network by using mobile agents. Simultaneously, the agents trace the intruders. IDA detects intrusions based on information collected and the route of intrusion. This paper

Multiple Independent Lazy Intruders

by Ali Kassem, Pascal Lafourcade, Yassine Lakhnech
"... Abstract—We consider a model of multiple independent intruders that have no ability to share knowledge between each other. We use this model to analyze security in wireless ad-hoc networks, where each intruder has a local control in the network, i.e., he can read and send messages only to his direct ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
direct neighbors. Another application is the mobile ambient calculus where several intruder processes are not able to exchange their knowledge. Both these security problems can be reduced to satisfiability of lazy intruder constraint systems, for a bounded number of steps of the honest agents. However

DETECTION OF INTRUDER NODES IN AUTONOMOUS MOBILE MESH NETWORKS

by Kiruthika Devi M, Rama Rajan
"... Abstract — In this paper, we describe the Autonomous Mobile mesh network with security. In MANET nodes move from one place to another place in free directions. The movement of the nodes may split the network and form more than one group. In this case communication between two nodes will be disconnec ..."
Abstract - Add to MetaCart
Abstract — In this paper, we describe the Autonomous Mobile mesh network with security. In MANET nodes move from one place to another place in free directions. The movement of the nodes may split the network and form more than one group. In this case communication between two nodes

Detecting intruders in complex environments with limited range mobile sensors

by Andreas Kolling, Stefano Carpin - Robot Motion and Control 2007, Lecture Notes in Information and Control
"... Summary. This paper examines the problem of detecting intruders in large multiply-connected environments with multiple robots and limited range sensors. We divide the problem into two sub-problems: 1) partitioning of the environment and 2) a new problem called weighted graph clearing. We reduce the ..."
Abstract - Cited by 4 (4 self) - Add to MetaCart
Summary. This paper examines the problem of detecting intruders in large multiply-connected environments with multiple robots and limited range sensors. We divide the problem into two sub-problems: 1) partitioning of the environment and 2) a new problem called weighted graph clearing. We reduce

A Performance Analysis of Chasing Intruders by Implementing Mobile Agents

by Omid Mahdi Ebadati E, Harleen Kaur, M. Afshar Alam, Omid Mahdi Ebadati E, Harleen Kaur, M. Afshar Alam
"... An Intrusion Detection System in network fetches the intrusions information from systems by using Mobile Agents aid. Intrusion Detection System detects intrusions based on the collected information and routes the intrusion. The intelligent decisions on communications permit agents to gain their goal ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
An Intrusion Detection System in network fetches the intrusions information from systems by using Mobile Agents aid. Intrusion Detection System detects intrusions based on the collected information and routes the intrusion. The intelligent decisions on communications permit agents to gain

Mobility and Intruder Prior Information Improving the Barrier Coverage of Sparse Sensor Networks

by Shibo He, Jiming Chen, Xu Li, Xuemin (Sherman) Shen, Youxian Sun , 2014
"... Barrier coverage problem in emerging mobile sensor networks has been an interesting research issue due to many related real-life applications. Existing solutions are mainly con-cerned with deciding one-time movement for individual sensors to construct as many barriers as possible, which may not be ..."
Abstract - Add to MetaCart
periodically by mobile sensors. Based on the insight from PMS, we then propose a coordinated sensor patrolling (CSP) algorithm to further improve the barrier coverage, where each sensor’s current movement strategy is derived from the information of intruder arrivals in the past. By jointly exploiting sensor

Robust sensor self-initialization Whispering to avoid intruders

by Carlos Ribeiro
"... Abstract. Wireless Sensor Networks (WSN) are becoming bigger and with this growth comes the need for new automatic mechanisms for initializations done by hand. One of those mechanisms is the assignment of addresses to nodes. Several solution were already proposed for mobile ad-hoc networks but they ..."
Abstract - Cited by 4 (1 self) - Add to MetaCart
Abstract. Wireless Sensor Networks (WSN) are becoming bigger and with this growth comes the need for new automatic mechanisms for initializations done by hand. One of those mechanisms is the assignment of addresses to nodes. Several solution were already proposed for mobile ad-hoc networks
Next 10 →
Results 1 - 10 of 290
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University