Learn More
The miniaturization of hardware components has lead to the development of Wireless Sensor Networks (WSN) and networked-applications over them. Meanwhile, middleware systems have also been proposed in order to both facilitating the development of these applications and providing common application services. The development of middleware for sensor networks,(More)
The last two decades have witnessed major advances in the wireless communication area, which have been supported by the increasing capabilities of portable devices, such as notebooks, tablets, cellular phones, smart phones and personal digital assistants (PDAs). Today, they provide a rich computing environment and incorporate different radio technologies.(More)
A wireless sensor network (WSN) consists of a large number of small devices with computational power, wireless communication and sensing capability. These networks have been developed for a wide range of applications, such as habitat monitoring, object tracking , precision agriculture, building monitoring and military systems. Meanwhile, middleware systems(More)
Attack detection Internet security Anomalous traffic a b s t r a c t This research is of the view that only tightly coordinated work among security components as we know them today including firewalls, traffic analysis modules, intrusion detection systems, antivirus remediation systems, etc., is likely to take us closer to a more effective solution against(More)
Knowing available energy in each part of a wireless sensor networks (WSN) is undoubtedly essential information. A simple approach to achieve this would be for sensor nodes to periodically report to the sink node on their available energy. This approach is expensive however in terms of energy consumption. In this work we apply several sampling techniques for(More)
Automatic nudity detection strategies play an important role in solutions focusing on controlling access to inappropriate content. These strategies usually apply filter or similar approaches in order to detect nudity in digital images. In this paper we propose a strategy for nudity detection based on applying image zoning. Moreover, we perform feature(More)
The inappropriate use of features intended to improve usability and interactivity of web applications has resulted in the emergence of various threats, including Cross-Site Scripting(XSS) attacks. In this work, we developed ETSS Detector, a generic and modular web vulnerability scanner that automatically analyzes web applications to find XSS(More)
A simple examination of Internet traffic shows a wide mix of relevant and unwanted traffic. The latter is becoming increasingly harmful to network performance and service availability , while often consuming precious network and processing resources. Coordinated attacks, such as distributed denial-of-services (DDoS), large-scale scans, and worm outbreaks ,(More)