Sciweavers

7329 search results - page 1373 / 1466
» Network Extractor Protocols
Sort
View
142
Voted
AUSDM
2007
Springer
185views Data Mining» more  AUSDM 2007»
15 years 9 months ago
An Approach to Argumentation Context Mining from Dialogue History in an E-Market Scenario
Argumentation allows agents to exchange additional information to argue about their beliefs and other mental attitudes during the negotiation process. Utterances and subsequent obs...
Khandaker Shahidul Islam
114
Voted
CCS
2007
ACM
15 years 9 months ago
Non-intrusive IP traceback for DDoS attacks
The paper describes a Non-Intrusive IP traceback scheme which uses sampled traffic under non-attack conditions to build and maintains caches of the valid source addresses transiti...
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dula...
118
Voted
ESORICS
2007
Springer
15 years 9 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
121
Voted
EUROGP
2007
Springer
102views Optimization» more  EUROGP 2007»
15 years 9 months ago
Real-Time, Non-intrusive Evaluation of VoIP
Abstract. Speech quality, as perceived by the users of Voice over Internet Protocol (VoIP) telephony, is critically important to the uptake of this service. VoIP quality can be deg...
Adil Raja, R. Muhammad Atif Azad, Colin Flanagan, ...
110
Voted
HUC
2007
Springer
15 years 9 months ago
Privacy Enhancing Technologies for RFID in Retail- An Empirical Investigation
This article investigates the conflicting area of user benefits arising through item level RFID tagging and a desire for privacy. It distinguishes between three approaches feasible...
Sarah Spiekermann
« Prev « First page 1373 / 1466 Last » Next »