Sciweavers

2236 search results - page 105 / 448
» Intrusion detection techniques and approaches
Sort
View
EASSS
2001
Springer
15 years 2 months ago
Social Knowledge in Multi-agent Systems
This contribution presents a knowledge-based model of the agents’ mutual awareness (social knowledge) and justifies its role in various classes of applications of the concept of...
Vladimír Marík, Michal Pechoucek, Ol...
WSC
2007
15 years 10 days ago
Cyber attack modeling and simulation for network security analysis
Cyber security methods are continually being developed. To test these methods many organizations utilize both virtual and physical networks which can be costly and time consuming....
Michael E. Kuhl, Jason Kistner, Kevin Costantini, ...
SECURWARE
2007
IEEE
15 years 4 months ago
A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments
A Man-in-the-Middle (MitM) attack is, in the scope of a LAN, a technique where an attacker is able to redirect all traffic between two hosts of that same LAN for packet sniffing...
Jorge Belenguer, Carlos Miguel Tavares Calafate
JEI
2008
109views more  JEI 2008»
14 years 8 months ago
New approach for liveness detection in fingerprint scanners based on valley noise analysis
Recent research has shown that it is possible to spoof a variety of fingerprint scanners using some simple techniques with molds made from plastic, clay, Play-Doh, silicon, or gela...
Bozhao Tan, Stephanie A. C. Schuckers
GLOBECOM
2006
IEEE
15 years 4 months ago
Digital Complex Signal Processing Techniques for Impulse Radio
— This paper describes the digital complex signal processing techniques for a pulse-based UWB radio. The proposed baseband is essential to fully exploit the wideband signal chara...
Mike Shuo-Wei Chen, Robert W. Brodersen