Sciweavers

145 search results - page 27 / 29
» Perspectives on Progress and Directions for Network Security...
Sort
View
RAID
2004
Springer
13 years 11 months ago
Attack Analysis and Detection for Ad Hoc Routing Protocols
Abstract. Attack analysis is a challenging problem, especially in emerging environments where there are few known attack cases. One such new environment is the Mobile Ad hoc Networ...
Yi-an Huang, Wenke Lee
IMC
2006
ACM
14 years 9 days ago
A multifaceted approach to understanding the botnet phenomenon
The academic community has long acknowledged the existence of malicious botnets, however to date, very little is known about the behavior of these distributed computing platforms....
Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, And...
NN
1998
Springer
151views Neural Networks» more  NN 1998»
13 years 6 months ago
Evolutionary neurocontrollers for autonomous mobile robots
In this article we describe a methodology for evolving neurocontrollers of autonomous mobile robots without human intervention. The presentation, which spans from technological an...
Dario Floreano, Francesco Mondada
IEEEIAS
2007
IEEE
14 years 20 days ago
Cyber Threat Trend Analysis Model Using HMM
Prevention, not reaction, is normally recognized as one of the best defense strategy against malicious hackers or attackers. The desire of deploying better prevention mechanism mo...
Do-Hoon Kim, Taek Lee, Sung-Oh David Jung, Hoh Pet...
HICSS
2005
IEEE
103views Biometrics» more  HICSS 2005»
13 years 12 months ago
Legal and Ethical Implications of Employee Location Monitoring
Location technologies allow employers to monitor the location of employees. The technologies range from global positioning systems able to determine outdoor locations worldwide to...
Gundars Kaupins, Robert P. Minch