Sciweavers

1748 search results - page 89 / 350
» Security Models for Heterogeneous Networking
Sort
View
CCS
2006
ACM
15 years 7 months ago
Time series modeling for IDS alert management
Intrusion detection systems create large amounts of alerts. Significant part of these alerts can be seen as background noise of an operational information system, and its quantity...
Jouni Viinikka, Hervé Debar, Ludovic M&eacu...
126
Voted
ICUMT
2009
15 years 1 months ago
Visualizations of human activities in sensor-enabled ubiquitous environments
Abstract--Sensor network ubiquitous environments may generate a lot of data including heterogeneous `raw' sensor data, low-level feature and/or trend data and higher-level con...
Brian J. d'Auriol, Le Xuan Hung, Sungyoung Lee, Yo...
114
Voted
IJCAI
1989
15 years 4 months ago
Beyond PDP: The Frequency Modulation Neural Network Architecture
This paper proposes the Frequency Modulation Neural Network as an alternative to current neuralnet models. This proposal is for an architecture of a heterogeneous neural-network i...
Hideto Tomabechi, Hiroaki Kitano
118
Voted
CN
2007
80views more  CN 2007»
15 years 3 months ago
A queueing analysis for the denial of service (DoS) attacks in computer networks
In most network security analysis, researchers mainly focus on qualitative studies on security schemes and possible attacks, and there are few papers on quantitative analysis in t...
Yang Wang, Chuang Lin, Quan-Lin Li, Yuguang Fang
CCS
2009
ACM
16 years 4 months ago
Unconditionally secure message transmission in arbitrary directed synchronous networks tolerating generalized mixed adversary
In this paper, we re-visit the problem of unconditionally secure message transmission (USMT) from a sender S to a receiver R, who are part of a distributed synchronous network, mo...
Kannan Srinathan, Arpita Patra, Ashish Choudhary, ...