Cooperative intrusion detection techniques for MANETs utilize ordinary computing hosts as network intrusion sensors. If compromised, these hosts may inject bogus data into the int...
Daniel Sterne, Geoffrey Lawler, Richard Gopaul, Br...
We propose a method to verify the result of attacks detected by signature-based network intrusion detection systems using lightweight protocol analysis. The observation is that ne...
: Functionally related genes involved in the same molecular-genetic, biochemical, or physiological process are often regulated coordinately Such regulation is provided by precisely...
Alexander E. Kel, Tatiana Konovalova, Tagir Valeev...
MT systems that use only superficial representations, including the current generation of statistical MT systems, have been successful and useful. However, they will experience a p...
Florence Reeder, Bonnie J. Dorr, David Farwell, Ni...
Abstract. This paper presents a framework that lets a component developer provide a component user with different kinds of information, depending on the specific context and needs....
Alessandro Orso, Mary Jean Harrold, David S. Rosen...