To search, Click below search items.

 

All Published Papers Search Service

Results for ; Total 10726

Title

Risk Leveling of Network Traffic Anomalies

Author

Charlie Isaksson, Yu Meng, Margaret H. Dunham

Citation

Vol. 6  No. 6  pp. 258-265

Keywords

data mining, risk leveling, intrusion detection, anomaly, data stream


Title

Implementation and Design of PC Control System Using Mobile-Based Database

Author

Jae-ho Lee, Hye-ja Bang

Citation

Vol. 6  No. 6  pp. 253-257

Keywords

Mobile


Title

Study on Dynamic Key Management of Clustered Sensor Networks

Author

Huanzhao Wang, Dongwei Luo, Feifei Chen, Zengzhi Li

Citation

Vol. 6  No. 6  pp. 245-252

Keywords

Sensor networks, dynamic key management, key-pool, clustered sensor networks, key exchange


Title

Worm Poisoning Technology and Application

Author

Bing Wu, Xiaochun Yun, Xiang Cui

Citation

Vol. 6  No. 6  pp. 236-244

Keywords

Poisoning, PoisonWorm, SIPR, Detection, DHT, P2P


[1] ... [prev] [2591] [2592] [2593] [2594] [2595] [2596] [2597] [2598] [2599] [2600] [next] ... [2682]