Sciweavers

619 search results - page 43 / 124
» Learning with Security
Sort
View
CNSR
2004
IEEE
174views Communications» more  CNSR 2004»
13 years 11 months ago
Network Intrusion Detection Using an Improved Competitive Learning Neural Network
This paper presents a novel approach for detecting network intrusions based on a competitive learning neural network. In the paper, the performance of this approach is compared to...
John Zhong Lei, Ali A. Ghorbani
BLISS
2009
IEEE
13 years 8 months ago
Autonomous Physical Secret Functions and Clone-Resistant Identification
Self configuring VLSI technology architectures offer a new environment for creating novel security functions. Two such functions for physical security architectures are proposed t...
Wael Adi
FSE
1998
Springer
102views Cryptology» more  FSE 1998»
13 years 12 months ago
Cryptanalytic Attacks on Pseudorandom Number Generators
In this paper we discuss PRNGs: the mechanisms used by real-world secure systems to generate cryptographic keys, initialization vectors, "random" nonces, and other values...
John Kelsey, Bruce Schneier, David Wagner, Chris H...
ITICSE
2004
ACM
14 years 1 months ago
The backwash effect on SQL skills grading
This paper examines the effect of grading approaches for SQL query formulation on students’ learning strategies. The way that students are graded in a subject has a significant ...
Julia Coleman Prior, Raymond Lister
AGENTS
2001
Springer
14 years 6 days ago
Using rat navigation models to learn orientation from visual input on a mobile robot
Rodents possess extraordinary navigation abilities that are far in excess of what current state-of-the-art robot agents are capable of. This paper describes research that is part ...
Brett Browning