Sciweavers

CNSR
2004
IEEE
124views Communications» more  CNSR 2004»
13 years 8 months ago
Adaptive Filtering of SPAM
In this paper, we present a new spam filter which acts as an additional layer in the spam filtering process. This filter is based on what we call a representative vocabulary. Spam...
L. Pelletier, Jalal Almhana, Vartan Choulakian
CNSR
2004
IEEE
13 years 8 months ago
A Topic Sharing Infrastructure for Weblog Networks
Weblogs have recently emerged as a popular means of sharing information on the Web. While they effectively foster the networking of participants on a one-to-one basis, so far they...
Sébastien Paquet, Phillip Pearson
CNSR
2004
IEEE
131views Communications» more  CNSR 2004»
13 years 8 months ago
Fast Flow Classification over Internet
In order to control and manage highly aggregated Internet traffic flows efficiently, we need to be able to categorize flows into distinct classes and to be knowledgeable about the...
A. Oveissian, Kavé Salamatian, Augustin Sou...
CNSR
2004
IEEE
13 years 8 months ago
Trusted Route Discovery with TORA Protocol
An ad-hoc network is formed when a group of wireless nodes pledge to help each other in passing packets based upon a pre-agreed protocol. Temporally Ordered Routing Algorithm (TOR...
Asad Amir Pirzada, Chris McDonald
CNSR
2004
IEEE
153views Communications» more  CNSR 2004»
13 years 8 months ago
Improving the Referrer-Based Web Log Session Reconstruction
In this paper we discuss the kinds of ambiguities a heuristic encounters during the process of user session reconstruction. Some criteria are introduced to measure these ambiguiti...
Mehran Nadjarbashi-Noghani, Ali A. Ghorbani
CNSR
2004
IEEE
174views Communications» more  CNSR 2004»
13 years 8 months ago
Network Intrusion Detection Using an Improved Competitive Learning Neural Network
This paper presents a novel approach for detecting network intrusions based on a competitive learning neural network. In the paper, the performance of this approach is compared to...
John Zhong Lei, Ali A. Ghorbani
CNSR
2004
IEEE
180views Communications» more  CNSR 2004»
13 years 8 months ago
The Reconstruction of User Sessions from a Server Log Using Improved Time-Oriented Heuristics
Web usage mining plays an important role in the personalization of Web services, adaptation of Web sites, and the improvement of Web server performance. It applies data mining tec...
Jie Zhang, Ali A. Ghorbani
CNSR
2004
IEEE
115views Communications» more  CNSR 2004»
13 years 8 months ago
The Effectiveness of Brute Force Attacks on RC4
Nathaniel Couture, Kenneth B. Kent
CNSR
2004
IEEE
153views Communications» more  CNSR 2004»
13 years 8 months ago
An Authenticated Broadcasting Scheme for Wireless Ad Hoc Network
In this paper, we propose a pairing-based signcryption scheme for authenticated broadcasting, which requires less computation than a previously proposed scheme suggesting identity...
Muhammad J. Bohio, Ali Miri