Sciweavers

1183 search results - page 208 / 237
» On flow-sensitive security types
Sort
View
IJNSEC
2007
194views more  IJNSEC 2007»
14 years 9 months ago
Covert Channel Forensics on the Internet: Issues, Approaches, and Experiences
The exponential growth of the Internet (WWW in particular) has opened-up several avenues for covert channel communication. Steganographic communication is one such avenue. Hiding ...
Ashish Patel, M. Shah, Rajarathnam Chandramouli, K...
TSMC
2008
172views more  TSMC 2008»
14 years 9 months ago
AdaBoost-Based Algorithm for Network Intrusion Detection
Abstract--Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security sy...
Weiming Hu, Wei Hu, Stephen J. Maybank
76
Voted
CN
2004
122views more  CN 2004»
14 years 9 months ago
Explicit transport error notification (ETEN) for error-prone wireless and satellite networks
This paper is a summary of the BBN Technical Report No. 8333, "Explicit Transport Error Notification for Error-Prone Wireless and Satellite Networks." In this study we di...
Rajesh Krishnan, James P. G. Sterbenz, Wesley M. E...
COMPUTER
2004
80views more  COMPUTER 2004»
14 years 9 months ago
Radiation Detection with Distributed Sensor Networks
Given the heightened awareness and response to threats posed to national security, it is important to evaluate, and if possible, improve current measures being taken to ensure our...
Sean M. Brennan, Angela M. Mielke, David C. Torney...
COMPSEC
2002
185views more  COMPSEC 2002»
14 years 9 months ago
A framework for understanding and predicting insider attacks
In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
E. Eugene Schultz