Sciweavers

7544 search results - page 105 / 1509
» Network Forensics Analysis
Sort
View
INFOCOM
2009
IEEE
15 years 10 months ago
An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding
— Privacy threat is one of the critical issues in network coding, where attacks such as traffic analysis can be easily launched by a malicious adversary once enough encoded packe...
Yanfei Fan, Yixin Jiang, Haojin Zhu, Xuemin Shen
HICSS
2008
IEEE
98views Biometrics» more  HICSS 2008»
15 years 9 months ago
Improvements in Security Alert Analysis with a Truth Maintenance System
A high percentage of false positives remains a problem in current network security detection systems. With the growing reliance of industry on computer networks, and the growing v...
Albert Tang, Pradeep Ray, Lundy Lewis
ISPD
2006
ACM
103views Hardware» more  ISPD 2006»
15 years 9 months ago
High accurate pattern based precondition method for extremely large power/ground grid analysis
In this paper, we propose more accurate power/ground network circuit model, which consider both via and ground bounce effects to improve the performance estimation accuracy of on-...
Jin Shi, Yici Cai, Sheldon X.-D. Tan, Xianlong Hon...
ICCAD
1992
IEEE
93views Hardware» more  ICCAD 1992»
15 years 7 months ago
Timing analysis in high-level synthesis
This paper presents a comprehensive timing model for behavioral-level specifications and algorithms for timing analysis in high-level synthesis. It is based on a timing network wh...
Andreas Kuehlmann, Reinaldo A. Bergamaschi
115
Voted
CSCW
2010
ACM
16 years 4 days ago
Social language network analysis
In this note we introduce a new methodology that combines tools from social language processing and network analysis to identify socially situated relationships between individual...
Andrew J. Scholand, Yla R. Tausczik, James W. Penn...