Sciweavers

1422 search results - page 275 / 285
» A Framework for Understanding Botnets
Sort
View
JTAER
2008
175views more  JTAER 2008»
14 years 11 months ago
A Core Component-based Modelling Approach for Achieving e-Business Semantics Interoperability
The adoption of advanced integration technologies that enable private and public organizations to seamlessly execute their business transactions electronically is still relatively...
Till Janner, Fenareti Lampathaki, Volker Hoyer, Sp...
JTAER
2006
100views more  JTAER 2006»
14 years 11 months ago
A Model for Improving e-Security in Australian Universities
As universities seek to adopt increased e-business, e-commerce and e-learning initiates, the overall approach taken for security management within the organisation plays an increa...
Lauren May, Tim Lane
93
Voted
IJNSEC
2007
125views more  IJNSEC 2007»
14 years 11 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
122
Voted
SP
2008
IEEE
159views Security Privacy» more  SP 2008»
14 years 11 months ago
Inferring neuronal network connectivity from spike data: A temporal data mining approach
Abstract. Understanding the functioning of a neural system in terms of its underlying circuitry is an important problem in neuroscience. Recent developments in electrophysiology an...
Debprakash Patnaik, P. S. Sastry, K. P. Unnikrishn...
BMCBI
2005
79views more  BMCBI 2005»
14 years 11 months ago
Cyclic nucleotide binding proteins in the Arabidopsis thaliana and Oryza sativa genomes
Background: Cyclic nucleotides are ubiquitous intracellular messengers. Until recently, the roles of cyclic nucleotides in plant cells have proven difficult to uncover. With an un...
Dave Bridges, Marie E. Fraser, Greg B. G. Moorhead