In-band network telemetry in industrial wireless sensor networks

A Karaagac, E De Poorter… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
With the emergence of the Internet of Things (IoT) and Industry 4.0 concepts, industrial
applications are going through a tremendous change that is imposing increasingly diverse …

Inter-session variability modelling and joint factor analysis for face authentication

R Wallace, M McLaren, C McCool… - 2011 International Joint …, 2011 - ieeexplore.ieee.org
This paper applies inter-session variability modelling and joint factor analysis to face
authentication using Gaussian mixture models. These techniques, originally developed for …

A decade of detailed observations (2008–2018) in steep bedrock permafrost at the Matterhorn Hörnligrat (Zermatt, CH)

S Weber, J Beutel, R Da Forno, A Geiger… - Earth System …, 2019 - essd.copernicus.org
The PermaSense project is an ongoing interdisciplinary effort between geo-science and
engineering disciplines and started in 2006 with the goals of realizing observations that …

Security Approaches for Data Provenance in the Internet of Things: A Systematic Literature Review

O Faraj, D Megias, J Garcia-Alfaro - arXiv preprint arXiv:2407.03466, 2024 - arxiv.org
The Internet of Things (IoT) relies on resource-constrained devices deployed in unprotected
environments. Different types of risks may be faced during data transmission in single-hop …

A practical approach for provenance transmission in wireless sensor networks

SMI Alam, S Fahmy - Ad Hoc Networks, 2014 - Elsevier
Assessing the trustworthiness of sensor data and transmitters of this data is critical for quality
assurance. Trust evaluation frameworks utilize data provenance along with the sensed data …

Minerva: Distributed tracing and debugging in wireless sensor networks

P Sommer, B Kusy - Proceedings of the 11th ACM Conference on …, 2013 - dl.acm.org
Development of wireless sensor network applications remains a challenge, due to lack of
visibility into the global network state. Debugging instrumentation using printf-like …

An improved Wu-Manber multiple patterns matching algorithm

X Ke, C Yong - 2006 IEEE International Performance …, 2006 - ieeexplore.ieee.org
NIDS is a powerful tool to defense the malicious attacks over the Internet. For the purpose of
detecting the attack online, NIDS must inspect the payload of the packets very fast to expose …

Path reconstruction in dynamic wireless sensor networks using compressive sensing

Z Liu, Z Li, M Li, W Xing, D Lu - IEEE/ACM Transactions on …, 2015 - ieeexplore.ieee.org
This paper presents CSPR, a compressive-sensing-based approach for path reconstruction
in wireless sensor networks. By viewing the whole network as a path representation space …

iPath: Path inference in wireless sensor networks

Y Gao, W Dong, C Chen, J Bu, W Wu… - IEEE/ACM Transactions …, 2014 - ieeexplore.ieee.org
Recent wireless sensor networks (WSNs) are becoming increasingly complex with the
growing network scale and the dynamic nature of wireless communications. Many …

TinySDM: Software defined measurement in wireless sensor networks

C Cao, L Luo, Y Gao, W Dong… - 2016 15th ACM/IEEE …, 2016 - ieeexplore.ieee.org
Network measurement, which provides detailed information about the behaviors of
operational networks, is essential for network management in wireless sensor networks. In …