To search, Click below search items.
All Published Papers Search Service
Title
An Intrusion Detection Technique Based on Change in Hurst Parameter with Application to Network Security
Author
C. M. Akujuobi, N. K. Ampah, Matthew N.O. Sadiku
Vol. 7 No. 5 pp. 55-64
Keywords
Intrusion detection and prevention, enterprise network, anomaly detection, self-similarity, multi-resolution technique
An Efficient Algorithm Based on Hopfield Neural Network for RNA Secondary Structure Prediction
Yanqiu Che, Zheng Tang, Shaozhi Liu
Vol. 7 No. 5 pp. 49-54
RNA secondary structure prediction, Hopfield neural network, stochastic dynamics
Uplink CDMA2000 Performance Evaluation With Mobile Clients
J. Arturo P?rez-D?az, J. Miguel Garc?a-Ramos, Miriam Calderon-Reyes, Luis G. Riojas-Mandujano
Vol. 7 No. 5 pp. 42-48
Throughput, CDMA2000, Transfer Rate, Uplink, Mobile clients
Lightweight Security Mechanism for PSTN-IP Telephony Convergence
Wojciech Mazurczyk, Zbigniew Kotulski
Vol. 7 No. 5 pp. 35-41
VoIP security, PSTN-IP Telephony interconnections, network steganography, audio watermarking