Sciweavers

1737 search results - page 176 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
RAID
2004
Springer
15 years 10 months ago
Attack Analysis and Detection for Ad Hoc Routing Protocols
Abstract. Attack analysis is a challenging problem, especially in emerging environments where there are few known attack cases. One such new environment is the Mobile Ad hoc Networ...
Yi-an Huang, Wenke Lee
138
Voted
BMCBI
2006
102views more  BMCBI 2006»
15 years 5 months ago
SNA - a toolbox for the stoichiometric analysis of metabolic networks
Background: Despite recent algorithmic and conceptual progress, the stoichiometric network analysis of large metabolic models remains a computationally challenging problem. Result...
Robert Urbanczik
GECCO
2009
Springer
138views Optimization» more  GECCO 2009»
15 years 11 months ago
IMAD: in-execution malware analysis and detection
The sophistication of computer malware is becoming a serious threat to the information technology infrastructure, which is the backbone of modern e-commerce systems. We, therefore...
Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Fa...
SP
2010
IEEE
165views Security Privacy» more  SP 2010»
15 years 9 months ago
A Practical Attack to De-anonymize Social Network Users
—Social networking sites such as Facebook, LinkedIn, and Xing have been reporting exponential growth rates. These sites have millions of registered users, and they are interestin...
Gilbert Wondracek, Thorsten Holz, Engin Kirda, Chr...
APBC
2003
123views Bioinformatics» more  APBC 2003»
15 years 6 months ago
A Platform for the Description, Distribution and Analysis of Genetic Polymorphism Data
In this paper we suggest the requirements for an open platform designed for the description, distribution and analysis of genetic polymorphism data. This platform is discussed in ...
Greg D. Tyrelle, Garry C. King