Sciweavers

1318 search results - page 182 / 264
» Measuring network security using dynamic bayesian network
Sort
View
BMCBI
2008
130views more  BMCBI 2008»
13 years 9 months ago
Function approximation approach to the inference of reduced NGnet models of genetic networks
Background: The inference of a genetic network is a problem in which mutual interactions among genes are deduced using time-series of gene expression patterns. While a number of m...
Shuhei Kimura, Katsuki Sonoda, Soichiro Yamane, Hi...
CCS
2010
ACM
13 years 9 months ago
PinDr0p: using single-ended audio features to determine call provenance
The recent diversification of telephony infrastructure allows users to communicate through landlines, mobile phones and VoIP phones. However, call metadata such as Caller-ID is ei...
Vijay A. Balasubramaniyan, Aamir Poonawalla, Musta...
IJNSEC
2007
144views more  IJNSEC 2007»
13 years 9 months ago
IPLess Stochastic Anonymous Routing Algorithm Using Multi-Agent Systems
The ability of communicating with a selected party anonymously is an important aspect of network security. Communicating anonymously means that no adversary can discern who is com...
Magdy Saeb, Meer Hamza, Ahmed El-Shikh
POLICY
2007
Springer
14 years 3 months ago
Using SAML and XACML for Complex Resource Provisioning in Grid Based Applications
This paper presents ongoing research and current results on the development of flexible access control infrastructure for complex resource provisioning (CRP) in Grid-based applica...
Yuri Demchenko, Leon Gommans, Cees de Laat
IJNSEC
2007
110views more  IJNSEC 2007»
13 years 9 months ago
A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices
The Wired Equivalent Privacy (WEP) uses the 64 bit RC4 secret key stream cipher as its layer 2 security protocol. Although the underlying RC4 cipher is secure, the potential reuse...
Chetan Nanjunda Mathur, K. P. Subbalakshmi