Sciweavers

2635 search results - page 480 / 527
» System Area Network Mapping
Sort
View
ESORICS
2007
Springer
14 years 3 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
GECCO
2007
Springer
177views Optimization» more  GECCO 2007»
14 years 3 months ago
Evolving virtual creatures revisited
Thirteen years have passed since Karl Sims published his work on evolving virtual creatures. Since then, several novel approaches to neural network evolution and genetic algorithm...
Peter Krcah
ISVC
2007
Springer
14 years 3 months ago
A Scalable Aural-Visual Environment for Security Event Monitoring, Analysis, and Response
Abstract. Intrusion detection systems gather large quantities of host and network information in an attempt to detect and respond to attacks against an organization. The widely var...
Paul Z. Kolano
AICCSA
2006
IEEE
133views Hardware» more  AICCSA 2006»
14 years 3 months ago
Learning acyclic rules based on Chaining Genetic Programming
Multi-class problem is the class of problems having more than one classes in the data set. Bayesian Network (BN) is a well-known algorithm handling the multi-class problem and is ...
Wing-Ho Shum, Kwong-Sak Leung, Man Leung Wong
AICT
2006
IEEE
163views Communications» more  AICT 2006»
14 years 3 months ago
A Methodology for Searching Reusable Business Processes
Web Services are becoming the prominent paradigm for distributed computing and electronic businesses. This makes natural the extension of the concepts at the base of the workflow ...
Francesco Calabrese, Giovanni Di Dio, Anna Rita Fa...