Search Results - General—Security and Protection General Terms Algorithms
-
1
Authors: et al.
Contributors: et al.
Subject Terms: Utility, Data Hiding, Location Obfuscation
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.220.3012; http://infoscience.epfl.ch/record/175834/files/CustomPrivacy.pdf
-
2
Authors: et al.
Contributors: et al.
Subject Terms: Categories and Subject Descriptors C.2.3 [Computer-Communication Networks, Network Opera- tions—network monitoring, network management, C.2.0 [Computer- Communication Networks, General—Security and protection General Terms Algorithms, Management, Security Keywords Intrusion Detection
File Description: application/pdf
-
3
Authors:
Contributors:
Subject Terms: Categories and Subject Descriptors H.2.8 [Database Management, Database applications— Data mining, C.2.0 [Computer Communication Net- works, General—security and protection General Terms Algorithms, Experimentation, Measurement, Security Keywords IP Size Estimation, Abusive Traffic Filtering, Advertisement Click Fraud, Real Data Experiments
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.677.180; http://static.googleusercontent.com/media/research.google.com/en/us/pubs/archive/35769.pdf
-
4
Authors: et al.
Contributors: et al.
Source: http://fuxi.cs.txstate.edu/~nasdg/papers/2007ccs/Highly efficient techniques for network forensics 2007.pdf.
Subject Terms: Categories and Subject Descriptors C.2.0 [Computer-Communication Networks, General— Security and protection General Terms Algorithms, Performance, Security Keywords Payload Attribution, Bloom Filter, Network Forensics
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.333.2451; http://fuxi.cs.txstate.edu/~nasdg/papers/2007ccs/Highly efficient techniques for network forensics 2007.pdf
Availability: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.333.2451
http://fuxi.cs.txstate.edu/~nasdg/papers/2007ccs/Highly efficient techniques for network forensics 2007.pdf -
5
Authors:
Contributors:
Subject Terms: Categories and Subject Descriptors C.2.4 [Computer-Communication Networks, Distributed Systems, C.2.0 [Computer-Communication Networks, General—Security and Protection General Terms Algorithms, Security Keywords Anonymous Communication, Peer-to-Peer Networks
File Description: application/pdf
-
6
Authors: et al.
Contributors: et al.
Subject Terms: H.2.3 [Database management, Languages, H.2.0 [Database management, General—Security, integrity, and protection General Terms Algorithms, Theory Keywords Semi-structured data, XML, update constraints, implication, data
File Description: application/pdf
-
7
Authors: et al.
Contributors: et al.
Subject Terms: Categories and Subject Descriptors C.2.3 [Computer-Communication Networks, Network Operations—network monitoring, C.2.0 [Computer-Communication Networks, General—Security and protection General Terms Algorithms, Measurement, Security Keywords Botnet, Global property extrapolation, Honeynet, Scan strategy inference, Situational awareness, Statistical inference
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.219.6617; http://www.cs.northwestern.edu/~ychen/Papers/asiaccs09.pdf
-
8
Authors: et al.
Contributors: et al.
Subject Terms: Networks, General—security and protection General Terms Algorithms, Measurement, Security Keywords Spam, botnet, regular expression, signature generation
File Description: application/pdf
-
9
Authors: LIU, ALEX X.
Source: ACM Transactions on Internet Technology; 2012, Vol. 11 Issue 4, p1-24, 24p
-
10
ENHANCING CYBER SECURITY MEASURES FOR 6G NETWORK DEEP DIVE INTO RISK ASSESSMENT AND RISK MITIGATION.
Authors:
Source: Cuestiones de Fisioterapia; 2025, Vol. 54 Issue 4, p1393-1408, 16p
-
11
Contributors: The Pennsylvania State University CiteSeerX Archives
Subject Terms: Categories and Subject Descriptors C.2.0 [Computer-Communication Networks, General –Security and protection General Terms Algorithms, Security, Measurement Keywords Anomaly classification, machine-learning
File Description: application/pdf
-
12
Authors: et al.
Contributors: et al.
Subject Terms: Categories and Subject Descriptors C.2.0 [Computer-Communication Networks, General –Security and protection General Terms Algorithms, Security, Measurement Keywords Anomaly classification, machine-learning
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.512.4304; http://www.comp.lancs.ac.uk/~marneria/PAM2009.pdf
-
13
Authors:
Contributors:
Subject Terms: Categories and Subject Descriptors C.2.0 [Computer-Communication Networks, General— Security and protection General Terms Algorithms, Security Keywords Location privacy, Bluetooth, pseudonyms
File Description: application/pdf
-
14
Authors:
Contributors:
Subject Terms: Categories and Subject Descriptors C.2.4 [Computer-Communication Networks, Distributed Systems, C.2.0 [Computer-Communication Networks, General—Security and Protection General Terms Algorithms, Security Keywords Anonymous Communication, Peer-to-Peer Networks
File Description: application/pdf
-
15
Authors: et al.
Contributors: et al.
Subject Terms: Categories and Subject Descriptors C.2.3 [Computer-Communication Networks, Network Operations—network monitoring, C.2.0 [Computer-Communication Networks, General—Security and protection General Terms Algorithms, Measurement, Security Keywords Botnet, Global property extrapolation, Honeynet, Scan strategy inference, Situational awareness, Statistical inference
File Description: application/pdf
-
16
Authors: et al.
Contributors: et al.
Subject Terms: C.2.0 [Computer Communication Networks, General – Security and protection (e.g, firewalls) General Terms Algorithms, Design, Security. Keywords DFA
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.9937; http://www.cs.ucsd.edu/~varghese/PAPERS/ancs2007.pdf
-
17
Authors: et al.
Source: TPM: Testing, Psychometrics, Methodology in Applied Psychology; 2025 Supplement, Vol. 32, p241-255, 15p
-
18
Authors: et al.
Contributors: et al.
Subject Terms: C.2.0 [Computer Communication Networks, General – Security and protection (e.g, firewalls) General Terms Algorithms, Design, Security. Keywords DFA
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.150.2381; http://www.cse.wustl.edu/ANCS/2007/papers/p155.pdf
-
19
Authors:
Contributors:
Subject Terms: Categories and Subject Descriptors C.2.0 [Computer Communication Networks, General— Security and protection General Terms Experimentation, Security Keywords Denial of Service, Network Security, Session Initiation Pro- tocol, IP Multimedia Subsystem
File Description: application/pdf
-
20
Authors: et al.
Contributors: et al.
Subject Terms: Categories and Subject Descriptors C.4 [Performance of Systems, Design studies, C.2.0 [Computer-Communication Networks, General—Security and protection General Terms Security, Design, Algorithms, Experimentation Keywords Sybil attacks, social networks, social network-based Sybil
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.422.2197; http://conferences.sigcomm.org/sigcomm/2010/papers/sigcomm/p363.pdf
Nájsť tento článok vo Web of Science
Full Text Finder