The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Our contribution in this paper is two fold. First we provide preliminary investigation results establishing program based anomaly detection is effective if short system call sequences are modeled along with their occurrence frequency. Second as a consequence of this, built normal program model can tolerate some level of contamination in the training dataset. We describe an experimental system Sequencegram,...
Secure group communication is one of the most significant requirements for different applications of a sensor network which employs a group rekeying mechanism for the secure and efficient delivery of its group data. We present a group rekeying scheme for broadcast security of a location aware wireless sensor network exploiting the polynomial share based peer to peer key establishment [3, 4, 5] technique...
Routing scenario in ad hoc networks is different from infrastructure-based wireless networks; since in ad hoc networks each node acts as a router and is responsible for managing topological information and ensuring correct route learning. Although a number of secure routing protocols have been proposed so far, all of them have certain advantages and disadvantages. Hence, security in ad hoc networks...
In this paper, we suggest an extended security approach for Bluetooth's point-to-multipoint communication. Bluetooth specification defines the basic security measures like, key generation, authentication and encryption for a piconet- which is the basic network unit of maximum 8 active Bluetooth devices. How ever, very little effort has been given so far on point- to-multipoint communication security...
Secure multicasting is one of the major requirements for today's communication arena. And for any kind of secure communication, a key-distribution scheme is the most sensible part. Being a highly promising, low-cost, and emerging wireless technology, Bluetooth has key distribution supports for secure multicasting over its unit one-hop network, piconet. Bluetooth core specification defines basic security...
Distributed image steganography (DIS) (Y.S. Wu et al., 2004) is a new method of concealing secret information in several host images, leaving smaller traces than conventional steganographic techniques, and requiring a collection of affected images for secret information retrieval. Fusion system designs of the future will require enhanced security measures for distributed data communication. DIS, compared...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.