Sciweavers

923 search results - page 157 / 185
» Improved Slide Attacks
Sort
View
SAC
2004
ACM
14 years 3 months ago
Unsupervised learning techniques for an intrusion detection system
With the continuous evolution of the types of attacks against computer networks, traditional intrusion detection systems, based on pattern matching and static signatures, are incr...
Stefano Zanero, Sergio M. Savaresi
CPAIOR
2004
Springer
14 years 3 months ago
Models and Symmetry Breaking for 'Peaceable Armies of Queens'
We discuss a di cult optimization problem on a chess-board, requiring equal numbers of black and white queens to be placed on the board so that the white queens cannot attack the b...
Barbara M. Smith, Karen E. Petrie, Ian P. Gent
IWAN
2004
Springer
14 years 3 months ago
Secure, Customizable, Many-to-One Communication
Concast is a customizable many-to-one network-layer communication service. Although programmable services like concast can improve the efficiency of group applications, accompanyi...
Kenneth L. Calvert, Jim Griffioen, Billy Mullins, ...
SETA
2004
Springer
79views Mathematics» more  SETA 2004»
14 years 3 months ago
A Survey of the Merit Factor Problem for Binary Sequences
A classical problem of digital sequence design, first studied in the 1950s but still not well understood, is to determine those binary sequences whose aperiodic autocorrelations ...
Jonathan Jedwab
WISA
2004
Springer
14 years 3 months ago
Encrypted Watermarks and Linux Laptop Security
The most common way to implement full-disk encryption (as opposed to encrypted file systems) in the GNU/Linux operating system is using the encrypted loop device, known as CryptoL...
Markku-Juhani Olavi Saarinen