Sciweavers

2503 search results - page 300 / 501
» Building Computer Network Attacks
Sort
View
IAJIT
2010
196views more  IAJIT 2010»
15 years 10 days ago
A modified high capacity image steganography technique based on wavelet transform
: Steganography is the art and science of concealing information in unremarkable cover media so as not to arouse an eavesdropper’s suspicion. It is an application under informati...
Ali Al-Ataby, Fawzi Al-Naima
CORR
2008
Springer
146views Education» more  CORR 2008»
15 years 1 months ago
Intrusion Detection Using Cost-Sensitive Classification
Intrusion Detection is an invaluable part of computer networks defense. An important consideration is the fact that raising false alarms carries a significantly lower cost than not...
Aikaterini Mitrokotsa, Christos Dimitrakakis, Chri...
PAM
2009
Springer
15 years 8 months ago
Data Gathering in Optical Networks with the TL1 Toolkit
This paper describes a new tool for gathering (performance) data from optical network devices. During the last few years many National Research and Education Networks (NRENs) have ...
Ronald van der Pol, Andree Toonk
ICWE
2005
Springer
15 years 7 months ago
Identifying Websites with Flow Simulation
We present in this paper a method to discover the set of webpages contained in a logical website, based on the link structure of the Web graph. Such a method is useful in the conte...
Pierre Senellart
120
Voted
DEBS
2009
ACM
15 years 6 months ago
Soft state in the XSiena publish/subscribe system
This paper presents our experiences with building of the soft state XSiena publish/subscribe system. We provide a brief overview of our approach towards the soft state in publish/...
Zbigniew Jerzak, Christof Fetzer, Robert Wojcicki