To search, Click below search items.
All Published Papers Search Service
Title
Risk Leveling of Network Traffic Anomalies
Author
Charlie Isaksson, Yu Meng, Margaret H. Dunham
Vol. 6 No. 6 pp. 258-265
Keywords
data mining, risk leveling, intrusion detection, anomaly, data stream
Implementation and Design of PC Control System Using Mobile-Based Database
Jae-ho Lee, Hye-ja Bang
Vol. 6 No. 6 pp. 253-257
Mobile
Study on Dynamic Key Management of Clustered Sensor Networks
Huanzhao Wang, Dongwei Luo, Feifei Chen, Zengzhi Li
Vol. 6 No. 6 pp. 245-252
Sensor networks, dynamic key management, key-pool, clustered sensor networks, key exchange
Worm Poisoning Technology and Application
Bing Wu, Xiaochun Yun, Xiang Cui
Vol. 6 No. 6 pp. 236-244
Poisoning, PoisonWorm, SIPR, Detection, DHT, P2P