Sciweavers

267 search results - page 43 / 54
» Inspections - Some Surprising Findings
Sort
View
COMCOM
2008
145views more  COMCOM 2008»
13 years 8 months ago
A game-theoretic intrusion detection model for mobile ad hoc networks
In this paper, we address the problem of increasing the effectiveness of an intrusion detection system (IDS) for a cluster of nodes in ad hoc networks. To reduce the performance o...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...
IMCS
2007
77views more  IMCS 2007»
13 years 8 months ago
Incident response requirements for distributed security information management systems
Purpose – Security information management systems (SIMs) have been providing a unified distributed platform for the efficient management of security information produced by co...
Sarandis Mitropoulos, Dimitrios Patsos, Christos D...
BMCBI
2005
94views more  BMCBI 2005»
13 years 8 months ago
Computational identification of strain-, species- and genus-specific proteins
Background: The identification of unique proteins at different taxonomic levels has both scientific and practical value. Strain-, species- and genus-specific proteins can provide ...
Raja Mazumder, Darren A. Natale, Sudhir Murthy, Ra...
GLOBECOM
2010
IEEE
13 years 6 months ago
Skip Finite Automaton: A Content Scanning Engine to Secure Enterprise Networks
Abstract--Today's file sharing networks are creating potential security problems to enterprise networks, i.e., the leakage of confidential documents. In order to prevent such ...
Junchen Jiang, Yi Tang, Bin Liu, Yang Xu, Xiaofei ...
BMCBI
2011
13 years 5 days ago
Predicting mutually exclusive spliced exons based on exon length, splice site and reading frame conservation, and exon sequence
Background: Alternative splicing of pre-mature RNA is an important process eukaryotes utilize to increase their repertoire of different protein products. Several types of differen...
Holger Pillmann, Klas Hatje, Florian Odronitz, Bjo...