To search, Click below search items.
All Published Papers Search Service
Title
Matching TCP/IP Packets to Detect Stepping-Stone Intrusion
Author
Jianhua Yang, Shou-Hsuan Stephen Huang
Vol. 6 No. 10 pp. 269-276
Keywords
Intrusion detection, Stepping-stone, Packet-matching, Conservative algorithm, Greedy algorithm
A Robust Digital Watermarking System Adopting 2D Barcode against Digital Piracy on P2P Network
Eui-Hyun Jung, Seong-Yun Cho
Vol. 6 No. 10 pp. 263-268
Digital Piracy, Watermarking, P2P
Meta Modeling for Combinatorial Catalyst Optimization
Fr?deric Clerc, David Farrusseng, Ricco Rakotomalala, Nicolas Nycoloyannis, Claude Mirodatos
Vol. 6 No. 10 pp. 256-262
Optimization, Data Mining, Combinatorial Catalysis
Hybrid Real-Coded Genetic Algorithm with Quasi-Simplex Technique
Guoli Zhang, Haiyan Lu
Vol. 6 No. 10 pp. 246-255
Genetic algorithm, Real-coded, Elitist strategy, Quasi- simplex technique