Sciweavers

6555 search results - page 1052 / 1311
» Secure attribute-based systems
Sort
View
IPOM
2009
Springer
15 years 10 months ago
A Labeled Data Set for Flow-Based Intrusion Detection
Abstract. Flow-based intrusion detection has recently become a promising security mechanism in high speed networks (1-10 Gbps). Despite the richness in contributions in this field...
Anna Sperotto, Ramin Sadre, Frank van Vliet, Aiko ...
WIKIS
2009
ACM
15 years 10 months ago
Wiki credibility enhancement
Wikipedia has been very successful as an open encyclopedia which is editable by anybody. However, the anonymous nature of Wikipedia means that readers may have less trust since th...
Felix Halim, Yongzheng Wu, Roland H. C. Yap
126
Voted
DELTA
2008
IEEE
15 years 10 months ago
AES-Based BIST: Self-Test, Test Pattern Generation and Signature Analysis
Re-using embedded resources for implementing builtin self test mechanisms allows test cost reduction. In this paper we demonstrate how to implement costefficient built-in self tes...
M. Doulcier, Marie-Lise Flottes, Bruno Rouzeyre
DEPCOS
2008
IEEE
96views Hardware» more  DEPCOS 2008»
15 years 10 months ago
Standards Conformity Framework in Comparison with Contemporary Methods Supporting Standards Application
Achieving and assessing conformity with standards and compliance with various sets of requirements generates significant costs for contemporary economies. Great deal of this is sp...
Lukasz Cyra, Janusz Górski
HICSS
2008
IEEE
156views Biometrics» more  HICSS 2008»
15 years 10 months ago
A Centrality Measure for Electrical Networks
—We derive a measure of “electrical centrality” for AC power networks, which describes the structure of the network as a function of its electrical topology rather than its p...
Paul Hines, Seth Blumsack
« Prev « First page 1052 / 1311 Last » Next »