Browsing by Subject "Intrusion detection"
Now showing items 1-3 of 3
-
Article
Graphical inference for multiple intrusion detection
(2008)In this paper, we consider vulnerabilities of networked systems and develop a multiple intrusion detection system (MIDS) which operates by running belief propagation on an appropriately constructed weighted bipartite graph. ...
-
Conference Object
Vulnerability assessment of intrusion recovery countermeasures in wireless sensor networks
(2011)Wireless sensor networks (WSNs) have become a hot research topic in recent years and are considered to be one of the building blocks of pervasive computing. Many diverse, mission-critical applications are deployed, including ...
-
Conference Object
The wireless control network: Monitoring for malicious behavior
(2010)We consider the problem of stabilizing a plant with a network of resource constrained wireless nodes. In a companion paper, we developed a protocol where each node repeatedly transmits an appropriate (stabilizing) linear ...