Sciweavers

2846 search results - page 511 / 570
» Not one click for security
Sort
View
CORR
2010
Springer
176views Education» more  CORR 2010»
15 years 4 months ago
Network Traffic Anomalies Detection and Identification with Flow Monitoring
Network management and security is currently one of the most vibrant research areas, among which, research on detecting and identifying anomalies has attracted a lot of interest. R...
Huy Anh Nguyen, Tam Van Nguyen, Dong Il Kim, Deokj...
CSI
2010
91views more  CSI 2010»
15 years 4 months ago
Towards trustworthy e-voting using paper receipts
Current electronic voting systems are not sufficient to satisfy trustworthy elections as they do not provide any proofs or confirming evidences of their honesty. This lack of trust...
Yunho Lee, Sangjoon Park, Masahiro Mambo, Seungjoo...
CSDA
2008
147views more  CSDA 2008»
15 years 4 months ago
Detection of unknown computer worms based on behavioral classification of the host
Machine learning techniques are widely used in many fields. One of the applications of machine learning in the field of the information security is classification of a computer be...
Robert Moskovitch, Yuval Elovici, Lior Rokach
AAECC
2006
Springer
125views Algorithms» more  AAECC 2006»
15 years 4 months ago
Combinatorial Group Theory and Public Key Cryptography
Abstract. After some excitement generated by recently suggested public key exchange protocols due to Anshel-Anshel-Goldfeld and Ko-Lee et al., it is a prevalent opinion now that th...
Vladimir Shpilrain, Gabriel Zapata
CLUSTER
2006
IEEE
15 years 4 months ago
A flexible multi-dimensional QoS performance measure framework for distributed heterogeneous systems
When users' tasks in a distributed heterogeneous computing environment (e.g., cluster of heterogeneous computers) are allocated resources, the total demand placed on some sys...
Jong-Kook Kim, Debra A. Hensgen, Taylor Kidd, Howa...