Learn More
The miniaturization of hardware components has lead to the development of Wireless Sensor Networks (WSN) and networked-applications over them. Meanwhile, middleware systems have also been proposed in order to both facilitating the development of these applications and providing common application services. The development of middleware for sensor networks,(More)
A wireless sensor network (WSN) consists of a large number of small devices with computational power, wireless communication and sensing capability. These networks have been developed for a wide range of applications, such as habitat monitoring, object tracking , precision agriculture, building monitoring and military systems. Meanwhile, middleware systems(More)
Attack detection Internet security Anomalous traffic a b s t r a c t This research is of the view that only tightly coordinated work among security components as we know them today including firewalls, traffic analysis modules, intrusion detection systems, antivirus remediation systems, etc., is likely to take us closer to a more effective solution against(More)
A simple examination of Internet traffic shows a wide mix of relevant and unwanted traffic. The latter is becoming increasingly harmful to network performance and service availability , while often consuming precious network and processing resources. Coordinated attacks, such as distributed denial-of-services (DDoS), large-scale scans, and worm outbreaks ,(More)
16 residents in a Residential Care Home for elderly people volunteered and were trained in a social skills program aimed at increasing conversational skills. Subjects were assigned randomly to three groups, one experimental and two control groups (placebo and waiting list). The techniques used in the experimental group were behavior rehearsal, feedback,(More)