Sciweavers

985 search results - page 131 / 197
» On the validity of digital signatures
Sort
View
JPDC
2006
87views more  JPDC 2006»
13 years 10 months ago
Honeypot back-propagation for mitigating spoofing distributed Denial-of-Service attacks
Any packet destined to a honeypot machine (that is, a decoy server machine) is most probably an attack packet. We propose honeypot back-propagation, a scheme that traces attack pa...
Sherif M. Khattab, Rami G. Melhem, Daniel Moss&eac...
NAR
2008
122views more  NAR 2008»
13 years 10 months ago
The Rice Annotation Project Database (RAP-DB): 2008 update
The Rice Annotation Project Database (RAP-DB) was created to provide the genome sequence assembly of the International Rice Genome Sequencing Project (IRGSP), manually curated ann...
BC
2000
81views more  BC 2000»
13 years 10 months ago
Insect visual homing strategies in a robot with analog processing
Abstract The visual homing abilities of insects can be explained by the snapshot hypothesis. It asserts that an animal is guided to a previously visited location by comparing the c...
Ralf Möller
TEC
2002
166views more  TEC 2002»
13 years 9 months ago
An artificial immune system architecture for computer security applications
With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect ...
Paul K. Harmer, Paul D. Williams, Gregg H. Gunsch,...
MTA
2010
116views more  MTA 2010»
13 years 8 months ago
Performing content-based retrieval of humans using gait biometrics
In order to analyse surveillance video, we need to efficiently explore large datasets containing videos of walking humans. At survei llance-image resolution, the human walk (their ...
Sina Samangooei, Mark S. Nixon