Sciweavers

1244 search results - page 166 / 249
» Network Intrusion Detection System with Data Mart
Sort
View
SAC
2009
ACM
15 years 11 months ago
Defending online reputation systems against collaborative unfair raters through signal modeling and trust
Online feedback-based rating systems are gaining popularity. Dealing with collaborative unfair ratings in such systems has been recognized as an important but difficult problem. T...
Yafei Yang, Yan Lindsay Sun, Steven Kay, Qing Yang
TWC
2008
194views more  TWC 2008»
15 years 4 months ago
Optimal Power Scheduling for Correlated Data Fusion in Wireless Sensor Networks via Constrained PSO
Optimal power scheduling for distributed detection in a Gaussian sensor network is addressed for both independent and correlated observations. We assume amplify-and-forward local p...
Thakshila Wimalajeewa, Sudharman K. Jayaweera
GPC
2009
Springer
15 years 2 months ago
Integrity Assurance Technique Using Determinant Approach
Data integrity is an important aspect of storage security and reliability which are prerequisite for most computer systems and network applications. This paper proposes a new tech...
Jasim A. Ghaeb
FTDCS
2004
IEEE
15 years 8 months ago
Self-Aware Distributed Embedded Systems
Distributed embedded sensor networks are now being successfully deployed in environmental monitoring of natural phenomena as well as for applications in commerce and physical secu...
Richard Pon, Maxim A. Batalin, Mohammad H. Rahimi,...
RAID
2010
Springer
15 years 2 months ago
CANVuS: Context-Aware Network Vulnerability Scanning
Enterprise networks face a variety of threats including worms, viruses, and DDoS attacks. Development of effective defenses against these threats requires accurate inventories of n...
Yunjing Xu, Michael Bailey, Eric Vander Weele, Far...