Sciweavers

1605 search results - page 285 / 321
» E-commerce Security Issues
Sort
View
169
Voted
CORR
2008
Springer
192views Education» more  CORR 2008»
15 years 2 months ago
Anomaly Detection in Streaming Sensor Data
In this chapter we consider a cell phone network as a set of automatically deployed sensors that records movement and interaction patterns of the population. We discuss methods fo...
Alec Pawling, Ping Yan, Julián Candia, Timo...
131
Voted
FCSC
2010
92views more  FCSC 2010»
15 years 2 months ago
TRainbow: a new trusted virtual machine based platform
Currently, with the evolution of virtualization technology, cloud computing mode has become more and more popular. However, people still concern the issues of the runtime integrity...
Yuzhong Sun, Haifeng Fang, Ying Song, Lei Du, Kai ...
130
Voted
SYNTHESE
2010
89views more  SYNTHESE 2010»
15 years 2 months ago
Proclus on the order of philosophy of nature
In this paper I show that Proclus is an adherent of the Classical Model of Science as set out elsewhere in this issue (de Jong and Betti 2008), and that he adjusts certain conditio...
Marije Martijn
122
Voted
TIFS
2010
128views more  TIFS 2010»
15 years 2 months ago
Steganalysis by subtractive pixel adjacency matrix
This paper presents a novel method for detection of steganographic methods that embed in the spatial domain by adding a low-amplitude independent stego signal, an example of which...
Tomás Pevný, Patrick Bas, Jessica J....
GLOBECOM
2010
IEEE
15 years 1 months ago
Finding and Mending Barrier Gaps in Wireless Sensor Networks
Constructing sensing barriers using wireless sensor networks has important applications in military operations and homeland security. The goal of forming a sensing barrier is to de...
Anwar Saipulla, Benyuan Liu, Jie Wang