Sciweavers

198
Voted
AINA
2010
IEEE
14 years 8 months ago
A Novel Cross Layer Intrusion Detection System in MANET
— Intrusion detection System forms a vital component of internet security. To keep pace with the growing trends, there is a critical need to replace single layer detection techno...
Rakesh Shrestha, Kyong-Heon Han, Dong-You Choi, Se...
120
Voted
AINA
2010
IEEE
14 years 8 months ago
Using Ontology for Personalized Mobile Message Computation
Li-Hua Li, Fu-Ming Lee, Yu-Chien Chou, Tsung-Jen P...
120
Voted
AINA
2010
IEEE
14 years 8 months ago
Human-Computer Interaction Experiments
Tomasz P. Bednarz, Con Caris, Jeremy Thompson, Chr...
AICT
2010
IEEE
240views Communications» more  AICT 2010»
14 years 8 months ago
Providing Security in 4G Systems: Unveiling the Challenges
— Several research groups are working on designing new security architectures for 4G networks such as Hokey and Y-Comm. Since designing an efficient security module requires a cl...
Mahdi Aiash, Glenford E. Mapp, Aboubaker Lasebae, ...
146
Voted
AICT
2010
IEEE
216views Communications» more  AICT 2010»
14 years 8 months ago
A Simplified Method for Optimising Sequentially Processed Access Control Lists
Among the various options for implementing Internet packet filters in the form of Access Control Lists (ACLs), is the intuitive – but potentially crude – method of processing t...
Vic Grout, John Davies
ACSAC
2010
IEEE
14 years 8 months ago
A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan
We present a quantitative lower bound on the number of vulnerable embedded device on a global scale. Over the past year, we have systematically scanned large portions of the inter...
Ang Cui, Salvatore J. Stolfo
ACSAC
2010
IEEE
14 years 8 months ago
Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts
In this work we show that once a single peer-to-peer (P2P) bot is detected in a network, it may be possible to efficiently identify other members of the same botnet in the same ne...
Baris Coskun, Sven Dietrich, Nasir D. Memon
122
Voted
ACSAC
2010
IEEE
14 years 8 months ago
The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnet
Joan Calvet, Carlton R. Davis, José M. Fern...
124
Voted
ACISICIS
2010
IEEE
14 years 8 months ago
A Study on Defect Density of Open Source Software
— Open source software (OSS) development is considered an effective approach to ensuring acceptable levels of software quality. One facet of quality improvement involves the dete...
Cobra Rahmani, Deepak Khazanchi
ACHI
2010
IEEE
14 years 8 months ago
Multi-language Ontology-Based Search Engine
Abstract—One of the first Multi-Language Information Retrieval (MLIR) systems was implemented in 1969 by Gerard Salton who enhanced his SMART system to retrieve multilingual doc...
Leyla Zhuhadar, Olfa Nasraoui, Robert Wyatt, Eliza...