Sciweavers

1748 search results - page 280 / 350
» Security Models for Heterogeneous Networking
Sort
View
144
Voted
CIKM
2011
Springer
14 years 3 months ago
Content based social behavior prediction: a multi-task learning approach
The study of information flow analyzes the principles and mechanisms of social information distribution. It is becoming an extremely important research topic in social network re...
Hongliang Fei, Ruoyi Jiang, Yuhao Yang, Bo Luo, Ju...
125
Voted
WCNC
2010
IEEE
15 years 7 months ago
MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks
—The Disruption Tolerant Networks (DTNs) are vulnerable to insider attacks, in which the legitimate nodes are compromised and the adversary modifies the delivery metrics of the ...
Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Ch...
AUSDM
2008
Springer
225views Data Mining» more  AUSDM 2008»
15 years 5 months ago
Service-independent payload analysis to improve intrusion detection in network traffic
The popularity of computer networks broadens the scope for network attackers and increases the damage these attacks can cause. In this context, Intrusion Detection Systems (IDS) a...
Iñigo Perona, Ibai Gurrutxaga, Olatz Arbela...
TWC
2008
138views more  TWC 2008»
15 years 3 months ago
LKE: A Self-Configuring Scheme for Location-Aware Key Establishment in Wireless Sensor Networks
Symmetric key agreement is significant to security provisioning in sensor networks with resource limitations. A number of pairwise key pre-distribution protocols have been proposed...
Fang Liu, Xiuzhen Cheng
BMCBI
2006
123views more  BMCBI 2006»
15 years 3 months ago
Computational models with thermodynamic and composition features improve siRNA design
Background: Small interfering RNAs (siRNAs) have become an important tool in cell and molecular biology. Reliable design of siRNA molecules is essential for the needs of large fun...
Svetlana A. Shabalina, Alexey N. Spiridonov, Aleks...