Sciweavers

526 search results - page 7 / 106
» Increase honeypot security through data analysis
Sort
View
CAU
2004
192views Cryptology» more  CAU 2004»
14 years 10 months ago
Encrypted? Randomised? Compromised? (When Cryptographically Secured Data is Not Secure)
Protecting data is not simply a case of encrypt and forget: even data with full cryptographic confidentiality and integrity protection can still be subject to information leakage. ...
Mike Bond, Jolyon Clulow
HICSS
2010
IEEE
153views Biometrics» more  HICSS 2010»
15 years 4 months ago
Securing E-Government Assets through Automating Deployment of Honeynets for IDS Support
One of the challenges facing system e-government security professionals is the laborious task of sifting through numerous log files in an attempt to identify malicious traffic and...
Christopher Hecker, Brian Hay
CIKM
2009
Springer
15 years 4 months ago
Event detection from flickr data through wavelet-based spatial analysis
Detecting events from web resources has attracted increasing research interests in recent years. Our focus in this paper is to detect events from photos on Flickr, an Internet ima...
Ling Chen, Abhishek Roy
IJACTAICIT
2010
189views more  IJACTAICIT 2010»
14 years 6 months ago
An Improved Algorithm for Data Hiding Using HH-subband Haar Wavelet Coefficients
This paper presents an improved adaptive algorithm for enhanced data hiding under HH-subband Haar Wavelet coefficients of a gray scale host image. The algorithm uses an optimal se...
Stuti Bazaj, Sachin Modi, Anand Mohan, S. P. Singh
186
Voted
CORR
2011
Springer
536views Education» more  CORR 2011»
14 years 4 months ago
Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator
— Mobile ad hoc networks (MANETs) are dynamic wireless networks without any infrastructure. These networks are weak against many types of attacks. One of these attacks is the bla...
H. A. Esmaili, M. R. Khalili Shoja, Hossein Gharae...