Learning affinities and dependencies for multi-target tracking using a CRF model

B Yang, C Huang, R Nevatia - CVPR 2011, 2011 - ieeexplore.ieee.org
We propose a learning-based Conditional Random Field (CRF) model for tracking multiple
targets by progressively associating detection responses into long tracks. Tracking task is …

An innovative approach for the wormhole attack detection and prevention in wireless ad hoc networks

MA Azer, SM El-Kassas… - … on Networking, Sensing …, 2010 - ieeexplore.ieee.org
Due to their diverse applications, ad hoc networks are appealing for use in many domains.
However, their features of open medium, absence of infrastructure, dynamic changing …

Immuning routing protocols from the wormhole attack in wireless ad hoc networks

MA Azer, SM El-Kassas… - 2009 Fourth International …, 2009 - ieeexplore.ieee.org
Ad hoc networks can be rapidly deployed and reconfigured. Hence, they are very appealing
as they can be tailored to lots of applications. Due to their features they are vulnerable to …

Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized Scheme

M Azer, S El-Kassas, AW Hassan… - … Reliability and Security, 2008 - ieeexplore.ieee.org
The dynamic and cooperative nature of ad hoc networks presents substantial challenges in
securing and detecting attacks in these networks. A particularly severe security attack, called …

An adaptive window-based susceptance extraction and its efficient implementation

G Zhong, CK Koh, V Balakrishnan, K Roy - Proceedings of the 40th …, 2003 - dl.acm.org
The determination of the set (or window) of segments that are inductively coupled to a
significant degree with a given segment plays a fundamental role in window-based …

Wormhole attacks mitigation in ad hoc networks

MA Azer - 2011 Sixth International Conference on Availability …, 2011 - ieeexplore.ieee.org
There are many unsolved problems in ad hoc networks; security being one of the major
concerns. The wormhole attack is among the most threatening and dangerous attacks on …

[PDF][PDF] A survey of wormhole attacks in mobile ad hoc networks

S Kumar - International Journal of Recent Research Aspects, 2017 - ijrra.net
Wormhole attack is an insidious attack against the basic routing function of mobile ad hoc
networks (MANETs) where an attacker captures the control and data traffics from one …

Un mecanismo de identificación de nodos basado en criptografía para la detección de la intrusión Wormhole en redes Ad-Hoc

CF Téllez Castaño - repositorio.unal.edu.co
Cuando hablamos de Redes Ad-Hoc, nos referimos a una tecnología que consiste en redes
de telecomunicación inalámbrica de topología dinámica, donde un conjunto de nodos …

A Scheme for Intrusion Detection and Response in Ad Hoc Networks

MA Azer, SM El-Kassas, MS El-Soudani - New Technologies, Mobility and …, 2007 - Springer
The dynamic and cooperative nature of ad hoc networks present substantial challenges in
securing and detecting attacks in these networks. In this paper, we propose three schemes …

[PDF][PDF] A Cryptography-Based Mechanism For Identifying Nodes Applied To Detection Of Wormhole Intrusion In Ad-Hoc Networks

CFT Castaño - Citeseer
When it comes to ad-hoc networks, we refer to a technology which consists of wireless
telecommunications network of dynamic topology, where a set of mobile communication …