Sciweavers

487 search results - page 76 / 98
» A Compiled Implementation of Normalization by Evaluation
Sort
View
ADHOCNETS
2009
Springer
15 years 6 months ago
Building Intrusion Detection with a Wireless Sensor Network
Abstract. This paper addresses the detection and reporting of abnormal building access with a wireless sensor network. A common office room, offering space for two working persons...
Markus Wälchli, Torsten Braun
FGIT
2009
Springer
15 years 6 months ago
Automatic Detection for JavaScript Obfuscation Attacks in Web Pages through String Pattern Analysis
Recently, most of malicious web pages include obfuscated codes in order to circumvent the detection of signature-based detection systems .It is difficult to decide whether the sti...
YoungHan Choi, TaeGhyoon Kim, SeokJin Choi, CheolW...
SASO
2008
IEEE
15 years 6 months ago
Wanderer between the Worlds - Self-Organized Network Stability in Attack and Random Failure Scenarios
Many real–world networks show a scale–free degree distribution, a structure that is known to be very stable in case of random failures. Unfortunately, the very same structure ...
Katharina Anna Zweig, Karin Zimmermann
ICC
2007
IEEE
144views Communications» more  ICC 2007»
15 years 6 months ago
On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks
— Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band wormholes) in routing path...
Xu Su, Rajendra V. Boppana
IMSCCS
2006
IEEE
15 years 5 months ago
Parallel Multicategory Support Vector Machines (PMC-SVM) for Classifying Microcarray Data
Multicategory Support Vector Machines (MC-SVM) are powerful classification systems with excellent performance in a variety of biological classification problems. However, the proc...
Chaoyang Zhang, Peng Li, Arun Rajendran, Youping D...