Sciweavers

3356 search results - page 494 / 672
» Determining Consensus Numbers
Sort
View
COMPSEC
2006
110views more  COMPSEC 2006»
13 years 10 months ago
Uncovering identities: A study into VPN tunnel fingerprinting
Operating System fingerprinting is a reconnaissance method which can be used by attackers or forensic investigators. It identifies a system's identity by observing its respon...
Vafa D. Izadinia, Derrick G. Kourie, Jan H. P. Elo...
CSDA
2006
97views more  CSDA 2006»
13 years 10 months ago
Fuzzy multidimensional scaling
Multidimensional scaling (MDS) is a data analysis technique for representing measurements of (dis)similarity among pairs of objects as distances between points in a low-dimensiona...
Pierre-Alexandre Hébert, Marie-Hél&e...
IJAR
2008
93views more  IJAR 2008»
13 years 10 months ago
Prototype based fuzzy classification in clinical proteomics
Proteomic profiling based on mass spectrometry is an important tool for studies at the protein and peptide level in medicine and health care. Thereby, the identification of releva...
Frank-Michael Schleif, Thomas Villmann, Barbara Ha...
FUIN
2006
97views more  FUIN 2006»
13 years 10 months ago
Thread Algebra with Multi-Level Strategies
In a previous paper, we developed an algebraic theory about threads and multi-threading based on the assumption that a deterministic interleaving strategy determines how threads ar...
Jan A. Bergstra, C. A. Middelburg
IJNSEC
2008
137views more  IJNSEC 2008»
13 years 10 months ago
Baseline Profile Stability for Network Anomaly Detection
Network attacks are commonplace in the Internet. One of the defense mechanisms against the network attacks is using a baseline profile established during normal operation to detec...
Yoohwan Kim, Ju-Yeon Jo, Kyunghee Kim Suh