Mapping Internet Sensors with Probe Response Attacks.
John BethencourtJason FranklinMary K. VernonPublished in: USENIX Security Symposium (2005)
Keyphrases
- security mechanisms
- real time
- internet users
- countermeasures
- sensor networks
- sensor data
- malicious traffic
- web technologies
- watermarking scheme
- data acquisition
- data fusion
- world wide
- communication technologies
- security requirements
- access control
- multimedia
- internet technology
- sensor fusion
- tcp ip
- hand held devices
- neural network