Sciweavers

62 search results - page 5 / 13
» isi 2006
Sort
View
ISI
2006
Springer
13 years 11 months ago
An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks
Wide applications of Wireless Sensor Networks also make them more interesting to adversaries. WSNs' protocols are designed without security in mind so they are susceptible to ...
Tran Van Phuong, Hung Le Xuan, Seong Jin Cho, Youn...
JASIS
2007
110views more  JASIS 2007»
13 years 10 months ago
Google Scholar citations and Google Web/URL citations: A multi-discipline exploratory analysis
In this paper we introduce a new data gathering method “Web/URL Citation” and use it and Google Scholar as a basis to compare traditional and Web-based citation patterns acros...
Kayvan Kousha, Mike Thelwall
JSAC
2006
108views more  JSAC 2006»
13 years 11 months ago
A simple baseband transmission scheme for power line channels
We propose a simple pulse-amplitude modulation (PAM)-based coded modulation scheme that overcomes two major constraints of power line channels, viz., severe insertion-loss and impu...
Raju Hormis, Inaki Berenguer, Xiaodong Wang
ISI
2006
Springer
13 years 11 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
ISI
2006
Springer
13 years 11 months ago
An Info-Gap Approach to Policy Selection for Bio-terror Response
Bio-terror events are accompanied by severe uncertainty: great disparity between the best available data and models, and the actual course of events. We model this uncertainty with...
Anna Yoffe, Yakov Ben-Haim