Now showing items 1-4 of 4
On Web, Semantics, and Data Mining: Intrusion Detection as a Case Study
We examine the intersection of data mining and semantic web in this paper. We briefly identify some points where they can impact one another, and then develop a specific example of intrusion detection, an application of ...
Security for Wireless Sensor Networks
(Springer Nature Switzerland AG., 2004-01-01)
This chapter identifies the vulnerabilities associated with the operational paradigms currently employed by Wireless Sensor Networks. A survey of current WSN security research is presented. The security issues of Mobile ...
A Secure Infrastructure for Service Discovery and Access in Pervasive Computing
Security is paramount to the success of pervasive computing environments. The system presented in this paper provides a communications and security infrastructure that goes far in advancing the goal of anywhere - anytime ...
SHOMAR: An Open Architecture for Distributed Intrusion Detection Services
Distributed Intrusion Detection Systems (DIDS) offer an alternative to centralized intrusion detection. Current research indicates that a distributed intrusion detection paradigm may afford greater coverage, consequently ...