Sensor fusion and automatic vulnerability analysis
Abstract
References
Index Terms
- Sensor fusion and automatic vulnerability analysis
Recommendations
Power-Efficient Direct-Voting Assurance for Data Fusion in Wireless Sensor Networks
Data fusion, in which collected data are fused before they are sent to the base station, is usually implemented over the wireless sensor network. Since a sensor is typically placed in locations that are accessible to malicious attackers, information ...
Measuring and ranking attacks based on vulnerability analysis
As the number of software vulnerabilities increases, the research on software vulnerabilities becomes a focusing point in information security. A vulnerability could be exploited to attack the information asset with the weakness related to the ...
An adaptive architecture of applying vulnerability analysis to IDS alerts
ICAIT '08: Proceedings of the 2008 International Conference on Advanced Infocomm TechnologyWith increasing intrusions and attacks on the Internet, there is an urgent need to develop techniques for network security. Current standalone network security products, such as the firewall systems, the Intrusion Detection System (IDS), the anti-virus ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Trinity College Dublin
Publication History
Check for updates
Author Tags
Qualifiers
- Article
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 552Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in