Sciweavers

1949 search results - page 279 / 390
» Protective Interface Specifications
Sort
View
CN
2008
128views more  CN 2008»
15 years 2 months ago
Autonomous security for autonomous systems
The Internet's interdomain routing protocol, BGP, supports a complex network of Autonomous Systems which is vulnerable to a number of potentially crippling attacks. Several p...
Josh Karlin, Stephanie Forrest, Jennifer Rexford
131
Voted
COMPSEC
2008
111views more  COMPSEC 2008»
15 years 2 months ago
An ontology-based policy for deploying secure SIP-based VoIP services
-- Voice services over Internet Protocol (VoIP) are nowadays much promoted by telecommunication and Internet service providers. However, the utilization of open networks, like the ...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...
BMCBI
2007
113views more  BMCBI 2007»
15 years 2 months ago
Analysis and prediction of antibacterial peptides
Background: Antibacterial peptides are important components of the innate immune system, used by the host to protect itself from different types of pathogenic bacteria. Over the l...
Sneh Lata, B. K. Sharma, G. P. S. Raghava
IJNSEC
2006
132views more  IJNSEC 2006»
15 years 2 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani
JUCS
2008
156views more  JUCS 2008»
15 years 2 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng