Sciweavers

2503 search results - page 143 / 501
» Building Computer Network Attacks
Sort
View
ISMVL
2000
IEEE
105views Hardware» more  ISMVL 2000»
15 years 6 months ago
Computational Neurobiology Meets Semiconductor Engineering
Many believe that the most important result to come out of the last ten years of neural network research is the significant change in perspective in the neuroscience community tow...
Dan W. Hammerstrom
IPPS
2003
IEEE
15 years 7 months ago
Trust Modeling for Peer-to-Peer Based Computing Systems
The peer-to-peer approach to design large-scale systems has significant benefits including scalability, low cost of ownership, robustness, and ability to provide site autonomy. ...
Farag Azzedin, Muthucumaru Maheswaran
CNSR
2004
IEEE
174views Communications» more  CNSR 2004»
15 years 5 months ago
Network Intrusion Detection Using an Improved Competitive Learning Neural Network
This paper presents a novel approach for detecting network intrusions based on a competitive learning neural network. In the paper, the performance of this approach is compared to...
John Zhong Lei, Ali A. Ghorbani
105
Voted
PERCOM
2006
ACM
16 years 1 months ago
Plan B: An Operating System for Ubiquitous Computing Environments
The conventional approach for building pervasive environments relies on middleware to integrate different systems. Instead, we have built a system that can deal with these environ...
Francisco J. Ballesteros, Enrique Soriano, Katia L...
ADHOCNOW
2006
Springer
15 years 7 months ago
Authenticated In-Network Programming for Wireless Sensor Networks
Abstract. Current in-network programming protocols for sensor networks allow an attacker to gain control of the network or disrupt its proper functionality by disseminating malicio...
Ioannis Krontiris, Tassos Dimitriou