Sciweavers

2503 search results - page 20 / 501
» Building Computer Network Attacks
Sort
View
EUSFLAT
2001
108views Fuzzy Logic» more  EUSFLAT 2001»
14 years 11 months ago
Intelligent modelling of the indoor climate in buildings by soft computing
The paper considers the application of soft computing techniques for predictive modelling in the built sector. TakagiSugeno fuzzy models are built by subtractive clustering to pro...
Alexander Gegov
ICCSA
2004
Springer
15 years 3 months ago
DDoS Attack Defense Architecture Using Active Network Technology
To solve the congestion problem, network nodes at near the zombies need to filter the attack traffic. But the amounts of attack packets are small at upstream node and it is hard t...
Choong Seon Hong, Yoshiaki Kasahara, Dea Hwan Lee
VIZSEC
2005
Springer
15 years 3 months ago
Multiple Coordinated Views for Network Attack Graphs
While efficient graph-based representations have been developed for modeling combinations of low-level network attacks, relatively little attention has been paid to effective tech...
Steven Noel, Michael Jacobs, Pramod Kalapa, Sushil...
CORR
2010
Springer
110views Education» more  CORR 2010»
14 years 9 months ago
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks
In secure multi-party computation n parties jointly evaluate an n-variate function f in the presence of an adversary which can corrupt up till t parties. All honest parties are req...
Shailesh Vaya