Sciweavers

418 search results - page 62 / 84
» Security Associations in Personal Networks: A Comparative An...
Sort
View
HICSS
2003
IEEE
117views Biometrics» more  HICSS 2003»
14 years 1 months ago
The German Mobile Standards Battle
The diffusion of innovations has long been a research domain in IS research. Yet, there is no sound theory nor practice to fully understand the complex mechanisms behind networks ...
Roman Beck, Daniel Beimborn, Tim Weitzel
IJNSEC
2007
119views more  IJNSEC 2007»
13 years 8 months ago
Evolutionary Design of Intrusion Detection Programs
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromis...
Ajith Abraham, Crina Grosan, Carlos Martín-...
ACSAC
2003
IEEE
13 years 11 months ago
A Stateful Intrusion Detection System for World-Wide Web Servers
Web servers are ubiquitous, remotely accessible, and often misconfigured. In addition, custom web-based applications may introduce vulnerabilities that are overlooked even by the ...
Giovanni Vigna, William K. Robertson, Vishal Kher,...
EJWCN
2010
118views more  EJWCN 2010»
13 years 2 months ago
Controlled Delegation Protocol in Mobile RFID Networks
To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is t...
Ming-Hour Yang
CIVR
2008
Springer
207views Image Analysis» more  CIVR 2008»
13 years 9 months ago
Accumulated motion energy fields estimation and representation for semantic event detection
In this paper, a motion-based approach for detecting highlevel semantic events in video sequences is presented. Its main characteristic is its generic nature, i.e. it can be direc...
Georgios Th. Papadopoulos, Vasileios Mezaris, Ioan...