Sciweavers

1875 search results - page 153 / 375
» Automatic Network Protocol Analysis
Sort
View
150
Voted
PRL
2000
182views more  PRL 2000»
15 years 3 months ago
Bayesian MLP neural networks for image analysis
We demonstrate the advantages of using Bayesian multi layer perceptron (MLP) neural networks for image analysis. The Bayesian approach provides consistent way to do inference by c...
Aki Vehtari, Jouko Lampinen
INFOCOM
2009
IEEE
15 years 10 months ago
A Chain Reaction DoS Attack on 3G Networks: Analysis and Defenses
Abstract—The IP Multimedia Subsystem (IMS) is being deployed in the Third Generation (3G) networks since it supports many kinds of multimedia services. However, the security of I...
Bo Zhao, Caixia Chi, Wei Gao, Sencun Zhu, Guohong ...
163
Voted
FLAIRS
2006
15 years 4 months ago
Design, Implementation and Performance Analysis of Pervasive Surveillance Networks
Pervasive surveillance implies the continuous tracking of multiple targets as they move about the monitored region. The tasks to be performed by a surveillance system are expresse...
Amit Goradia, Zhiwei Cen, Clayton Haffner, Ning Xi...
123
Voted
IJCNN
2007
IEEE
15 years 9 months ago
Analysis of mammogram using self-organizing neural networks based on spatial isomorphism
— The correct segmentation and measurement of mammography images is of fundamental importance for the development of automatic or computer-aided cancer detection systems. In this...
Aida A. Ferreira, Francisco Nascimento Jr., Ing Re...
NDSS
1999
IEEE
15 years 7 months ago
A Real-World Analysis of Kerberos Password Security
Kerberos is a distributed authentication system that many organizations use to handle domain-wide password security. Although it has been known for quite some time that Kerberos i...
Thomas D. Wu