Sciweavers

2699 search results - page 416 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
DSS
2006
132views more  DSS 2006»
13 years 9 months ago
Agents with shared mental models for enhancing team decision makings
Proactive information sharing is a challenging issue faced by intelligence agencies in effectively making critical decisions under time pressure in areas related to homeland secur...
John Yen, Xiaocong Fan, Shuang Sun, Timothy Hanrat...
IJSN
2006
76views more  IJSN 2006»
13 years 9 months ago
Elliptic curve cryptography-based access control in sensor networks
: Access control in sensor networks is used to authorise and grant users the right to access the network and data collected by sensors. Different users have different access right ...
Haodong Wang, Bo Sheng, Qun Li
ISI
2006
Springer
13 years 9 months ago
Visualizing Authorship for Identification
As a result of growing misuse of online anonymity, researchers have begun to create visualization tools to facilitate greater user accountability in online communities. In this stu...
Ahmed Abbasi, Hsinchun Chen
ISI
2006
Springer
13 years 9 months ago
Analyzing the Terrorist Social Networks with Visualization Tools
Analysis of terrorist social networks is essential for discovering knowledge about the structure of terrorist organizations. Such knowledge is important for developing effective co...
Christopher C. Yang, Nan Liu, Marc Sageman
ISI
2007
Springer
13 years 9 months ago
Host Based Intrusion Detection using Machine Learning
—Detecting unknown malicious code (malcode) is a challenging task. Current common solutions, such as anti-virus tools, rely heavily on prior explicit knowledge of specific instan...
Robert Moskovitch, Shay Pluderman, Ido Gus, Dima S...