Anomaly-based Intrusion Detection (AID) techniques are useful for detecting novel intrusions without known signatures. However, AID techniques suffer from higher false alarm rate ...
—Face recognition is a biometric identification method which among the other methods such as, finger print identification, speech recognition, signature and hand written recognit...
Abstract. In response to the current need for fast, secure and cheap public-key cryptography, we propose an interactive zero-knowledge identification scheme and a derived signature...
There are a significant number of proposals for modelling and developing Web Applications, but very few of them state rigorously how to elicit and represent requirements, and how t...
Accurate application traffic classification and identification are important for network monitoring and analysis. The accuracy of traditional Internet application traffic classific...
Byungchul Park, Young J. Won, Mi-Jung Choi, Myung-...