To search, Click below search items.

 

All Published Papers Search Service

Results for ; Total 10750

Title

Risk Leveling of Network Traffic Anomalies

Author

Charlie Isaksson, Yu Meng, Margaret H. Dunham

Citation

Vol. 6  No. 6  pp. 258-265

Keywords

data mining, risk leveling, intrusion detection, anomaly, data stream


Title

Implementation and Design of PC Control System Using Mobile-Based Database

Author

Jae-ho Lee, Hye-ja Bang

Citation

Vol. 6  No. 6  pp. 253-257

Keywords

Mobile


Title

Study on Dynamic Key Management of Clustered Sensor Networks

Author

Huanzhao Wang, Dongwei Luo, Feifei Chen, Zengzhi Li

Citation

Vol. 6  No. 6  pp. 245-252

Keywords

Sensor networks, dynamic key management, key-pool, clustered sensor networks, key exchange


Title

Worm Poisoning Technology and Application

Author

Bing Wu, Xiaochun Yun, Xiang Cui

Citation

Vol. 6  No. 6  pp. 236-244

Keywords

Poisoning, PoisonWorm, SIPR, Detection, DHT, P2P


[1] ... [prev] [2601] [2602] [2603] [2604] [2605] [2606] [2607] [2608] [2609] [2610] [next] ... [2688]