Sciweavers

6689 search results - page 81 / 1338
» A Network Security Monitor
Sort
View
CCS
2010
ACM
13 years 9 months ago
Spectrum based fraud detection in social networks
Xiaowei Ying, Xintao Wu, Daniel Barbará
FGCN
2008
IEEE
144views Communications» more  FGCN 2008»
14 years 3 months ago
A Novel Approach for Infrastructure Deployment for VANET
In last decade intelligent transportation systems (ITS) and vehicular ad hoc network (VANET) became one of the most active and emerging fields of research. It is expected that thi...
Une Thoing Rosi, Chowdhury Sayeed Hyder, Tai-hoon ...
CRYPTO
1989
Springer
87views Cryptology» more  CRYPTO 1989»
14 years 28 days ago
Practical Problems with a Cryptographic Protection Scheme
Z is a software system designed to provide media-transparent network services on a collection of UNIX® machines. These services are comprised of file transfer and command executi...
Jonathan M. Smith
HICSS
2007
IEEE
171views Biometrics» more  HICSS 2007»
14 years 23 days ago
Unified Architecture for Large-Scale Attested Metering
We introduce a secure architecture called an attested meter for advanced metering that supports large-scale deployments, flexible configurations, and enhanced protection for consu...
Michael LeMay, George Gross, Carl A. Gunter, Sanja...
PERCOM
2006
ACM
13 years 8 months ago
Embedding expression: Pervasive computing architecture for art and entertainment
Pervasive computing's historical driver applications include environmental monitoring, safety and security, home and office productivity and guided experience of cultural act...
Jeff Burke, Jonathan Friedman, Eitan Mendelowitz, ...