Sciweavers

6164 search results - page 1159 / 1233
» Teaching Computer Security
Sort
View
CCR
2010
128views more  CCR 2010»
15 years 16 days ago
The 2nd workshop on active internet measurements (AIMS-2) report
On February 8-10, 2010, CAIDA hosted the second Workshop on Active Internet Measurements (AIMS-2) as part of our series of Internet Statistics and Metrics Analysis (ISMA) workshop...
kc claffy, Emile Aben, Jordan Augé, Robert ...
CORR
2010
Springer
136views Education» more  CORR 2010»
15 years 16 days ago
Personalized Data Set for Analysis
Data Management portfolio within an organization has seen an upsurge in initiatives for compliance, security, repurposing and storage within and outside the organization. When suc...
Vishal Gupta, Ashutosh Saxena
IJISEC
2010
159views more  IJISEC 2010»
15 years 12 days ago
A generalization of Paillier's public-key system with applications to electronic voting
We propose a generalization of Paillier's probabilistic public key system, in which the expansion factor is reduced and which allows to adjust the block length of the scheme e...
Ivan Damgård, Mads Jurik, Jesper Buus Nielse...
ISF
2010
164views more  ISF 2010»
15 years 11 days ago
An SVM-based machine learning method for accurate internet traffic classification
Accurate and timely traffic classification is critical in network security monitoring and traffic engineering. Traditional methods based on port numbers and protocols have proven t...
Ruixi Yuan, Zhu Li, Xiaohong Guan, Li Xu
CORR
2011
Springer
221views Education» more  CORR 2011»
14 years 10 months ago
Course on System Design (structural approach)
—The article describes a course on system design (structural approach) which involves the following: issues of systems engineering; structural models; basic technological problem...
Mark Sh. Levin
« Prev « First page 1159 / 1233 Last » Next »