Sciweavers

98 search results - page 9 / 20
» Utilizing network features for privacy violation detection
Sort
View
ISI
2006
Springer
13 years 7 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
ACSAC
2002
IEEE
14 years 10 days ago
Evaluating the Impact of Automated Intrusion Response Mechanisms
Intrusion detection systems (IDSs) have reached a high level of sophistication and are able to detect intrusions with a variety of methods. Unfortunately, system administrators ne...
Thomas Toth, Christopher Krügel
VTC
2007
IEEE
14 years 1 months ago
Performance Evaluation of A Multiuser Detection Based MAC Design for Ad Hoc Networks
Abstract— In general, the performance and radio resource utilization of Ad Hoc networks are limited by half-duplex operation and possible collisions. In this paper, we propose a ...
Jinfang Zhang, Zbigniew Dziong, François Ga...
CORR
2010
Springer
175views Education» more  CORR 2010»
13 years 7 months ago
Detecting Security threats in the Router using Computational Intelligence
Information security is an issue of global concern. As the Internet is delivering great convenience and benefits to the modern society, the rapidly increasing connectivity and acc...
J. Visumathi, K. L. Shunmuganathan
DCOSS
2009
Springer
14 years 1 months ago
Detection and Localization Sensor Assignment with Exact and Fuzzy Locations
Sensor networks introduce new resource allocation problems in which sensors need to be assigned to the tasks they best help. Such problems have been previously studied in simplifi...
Hosam Rowaihy, Matthew P. Johnson, Diego Pizzocaro...