International Conference on Advanced Computing, Networking and Security最新文献

筛选
英文 中文
SQL Injection Attack Mechanisms and Prevention Techniques SQL注入攻击机制及防范技术
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_61
R. Chandrashekhar, Manoj Mardithaya, P. S. Thilagam, Dipankar Saha
{"title":"SQL Injection Attack Mechanisms and Prevention Techniques","authors":"R. Chandrashekhar, Manoj Mardithaya, P. S. Thilagam, Dipankar Saha","doi":"10.1007/978-3-642-29280-4_61","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_61","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125047622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Strong Minimum Interference Topology for Wireless Sensor Networks 无线传感器网络的强最小干扰拓扑
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_43
B. S. Panda, D. Shetty
{"title":"Strong Minimum Interference Topology for Wireless Sensor Networks","authors":"B. S. Panda, D. Shetty","doi":"10.1007/978-3-642-29280-4_43","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_43","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126089834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Post Mining of Diversified Multiple Decision Trees for Actionable Knowledge Discovery 面向可操作知识发现的多元多决策树后挖掘
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_20
Sudha Subramani, Sathiyabhama Balasubramaniam
{"title":"Post Mining of Diversified Multiple Decision Trees for Actionable Knowledge Discovery","authors":"Sudha Subramani, Sathiyabhama Balasubramaniam","doi":"10.1007/978-3-642-29280-4_20","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_20","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114252181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance Analysis of Pedestrian Detection at Night Time with Different Classifiers 不同分类器在夜间行人检测中的性能分析
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_15
P. Cyriac, Philomina Simon
{"title":"Performance Analysis of Pedestrian Detection at Night Time with Different Classifiers","authors":"P. Cyriac, Philomina Simon","doi":"10.1007/978-3-642-29280-4_15","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_15","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121059723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scalable Video Delivery over Peer-to-Peer Network 可扩展的视频传输点对点网络
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_34
A. K. Karunakar, Younsong Qio, Brian A. Lee
{"title":"Scalable Video Delivery over Peer-to-Peer Network","authors":"A. K. Karunakar, Younsong Qio, Brian A. Lee","doi":"10.1007/978-3-642-29280-4_34","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_34","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121526422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Mathematical Model to Realize the Parallel Computing Based Diminution Tree with List Ranking Based BD-TTCS as a New IPv4/IPv6 Transition Mechanism 一种新的IPv4/IPv6转换机制——基于列表排序的并行计算缩减树的数学模型
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_54
Prof. Jayappa(J) Hanumanthappa Davanagere, D. Manjaiah
{"title":"A Mathematical Model to Realize the Parallel Computing Based Diminution Tree with List Ranking Based BD-TTCS as a New IPv4/IPv6 Transition Mechanism","authors":"Prof. Jayappa(J) Hanumanthappa Davanagere, D. Manjaiah","doi":"10.1007/978-3-642-29280-4_54","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_54","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121787404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Misbehavior Detection Based on Ensemble Learning in VANET 基于VANET集成学习的不良行为检测
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_70
J. Grover, V. Laxmi, M. Gaur
{"title":"Misbehavior Detection Based on Ensemble Learning in VANET","authors":"J. Grover, V. Laxmi, M. Gaur","doi":"10.1007/978-3-642-29280-4_70","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_70","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114318646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
Consistency Maintenance of Modern Security Policies 现代安全策略的一致性维护
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_55
Bartosz Brodecki, J. Brzeziński, Piotr Sasak, Michal Szychowiak
{"title":"Consistency Maintenance of Modern Security Policies","authors":"Bartosz Brodecki, J. Brzeziński, Piotr Sasak, Michal Szychowiak","doi":"10.1007/978-3-642-29280-4_55","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_55","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114246325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Efficient and Reliable Centralized Connection Management Scheme for Computer Networks 一种高效可靠的计算机网络集中连接管理方案
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_52
Shreesha Kashyap, V. ShravanI., Anuraj Suman, T. K. Ramesh, R. VayaP.
{"title":"An Efficient and Reliable Centralized Connection Management Scheme for Computer Networks","authors":"Shreesha Kashyap, V. ShravanI., Anuraj Suman, T. K. Ramesh, R. VayaP.","doi":"10.1007/978-3-642-29280-4_52","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_52","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117336981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reconfigurable Web Service Composition Using Belief Revision 使用信念修订的可重构Web服务组合
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_8
Deivamani Mallayya, Baskaran Ramachandran
{"title":"Reconfigurable Web Service Composition Using Belief Revision","authors":"Deivamani Mallayya, Baskaran Ramachandran","doi":"10.1007/978-3-642-29280-4_8","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_8","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115808794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信