Sciweavers

SSWMC
2004
14 years 29 days ago
Quantitative evaluation of pairs and RS steganalysis
We give initial results from a new project which performs statistically accurate evaluation of the reliability of image steganalysis algorithms. The focus here is on the Pairs and...
Andrew D. Ker
NETSEC
2001
14 years 29 days ago
Combining World Wide Web and Wireless Security
Joris Claessens, Bart Preneel, Joos Vandewalle
NETSEC
2001
14 years 29 days ago
On Mobile Agent Based Transactions in Moderately Hostile Environments
Niklas Borselius, Chris J. Mitchell, Aaron Wilson
CNIS
2006
14 years 29 days ago
Towards effective packet classification
A variety of network security services, such as access control in firewalls and protocol analysis in intrusion detection systems, require the discrimination of packets based on th...
Yaxuan Qi, Jun Li
CNIS
2006
14 years 29 days ago
An efficient hybrid algorithm for multidimensional packet classification
Multidimensional Packet Classification is one of the most critical functions for network security devices such as firewalls and intrusion detection systems. Due to the worst case ...
Yaxuan Qi, Jun Li
CNIS
2006
14 years 29 days ago
Self-organising quorum systems for ad hoc networks
There are many essential applications for quorum systems in ad-hoc networks, such as that of location servers in large-scale networks. Existing research proposes many approaches t...
Gareth Owen, Mo Adda
CNIS
2006
14 years 29 days ago
STRBAC - An approach towards spatio-temporal role-based access control
The rapid emergence of GPS enabled devices, sensors and mobile equipment in commercial as well as government organizations has led to considerable research in time- and location-b...
Mahendra Kumar, Richard E. Newman
CNIS
2006
14 years 29 days ago
Design of a virtual computer security lab
We present the design and a prototype of a lab course on computer security, the necessity of which arises from the students' need to complement course work by hands-on experi...
Jörg Keller, Ralf Naues
CNIS
2006
14 years 29 days ago
Dynamically blocking access to web pages for spammers' harvesters
Almost all current anti spam measures are reactive, filtering being the most common. But to react means always to be one step behind. Reaction requires to predict the next action ...
Tobias Eggendorfer, Jörg Keller