International Conference on Advanced Computing, Networking and Security最新文献

筛选
英文 中文
Correlation in Distributed Intrusion Detection System Using Mobile Agent 基于移动代理的分布式入侵检测系统的相关性研究
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_65
Zakiya Malek, A. Koshti, C. Bhatt, Hemant Agrwal, Bhushan Trivedi
{"title":"Correlation in Distributed Intrusion Detection System Using Mobile Agent","authors":"Zakiya Malek, A. Koshti, C. Bhatt, Hemant Agrwal, Bhushan Trivedi","doi":"10.1007/978-3-642-29280-4_65","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_65","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127243800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Context Awareness Acquisition for Safety Sensor Data Processing on Industrial Sensor Network 工业传感器网络中安全传感器数据处理的上下文感知获取
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_5
Joon-Mo Yang, Jun-Yong Park, Ryumduck Oh
{"title":"Context Awareness Acquisition for Safety Sensor Data Processing on Industrial Sensor Network","authors":"Joon-Mo Yang, Jun-Yong Park, Ryumduck Oh","doi":"10.1007/978-3-642-29280-4_5","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_5","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124503006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
FARED: Fast Adapting RED Gateways for TCP/IP Networks 进展:快速适应TCP/IP网络的RED网关
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_51
M. Tahiliani, K. Shet, T. Basavaraju
{"title":"FARED: Fast Adapting RED Gateways for TCP/IP Networks","authors":"M. Tahiliani, K. Shet, T. Basavaraju","doi":"10.1007/978-3-642-29280-4_51","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_51","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125024798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reputation-Based Trust for Mobile Agents 基于声誉的移动代理信任
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_57
Priyanka Dadhich, Kamlesh Dutta, M. C. Govil
{"title":"Reputation-Based Trust for Mobile Agents","authors":"Priyanka Dadhich, Kamlesh Dutta, M. C. Govil","doi":"10.1007/978-3-642-29280-4_57","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_57","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130257805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Semantic Web Service Discovery with Structural Level Matching of Operations 具有结构级操作匹配的语义Web服务发现
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_9
P. Harshavardhanan, J. Akilandeswari, K. Krishna
{"title":"Semantic Web Service Discovery with Structural Level Matching of Operations","authors":"P. Harshavardhanan, J. Akilandeswari, K. Krishna","doi":"10.1007/978-3-642-29280-4_9","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_9","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116188232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Optimum Approach for Radio Resource Allocation(RRA) in Mobile WiMAX Network 移动WiMAX网络中无线资源分配的优化方法
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_42
R. Jha, A. Wankhade, U. Dalal
{"title":"An Optimum Approach for Radio Resource Allocation(RRA) in Mobile WiMAX Network","authors":"R. Jha, A. Wankhade, U. Dalal","doi":"10.1007/978-3-642-29280-4_42","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_42","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121777041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EgressBug: A Real Time Path Planning Algorithm for a Mobile Robot in an Unknown Environment EgressBug:未知环境下移动机器人实时路径规划算法
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_27
K. Guruprasad
{"title":"EgressBug: A Real Time Path Planning Algorithm for a Mobile Robot in an Unknown Environment","authors":"K. Guruprasad","doi":"10.1007/978-3-642-29280-4_27","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_27","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124121023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Characterizing DDoS Attack Distributions from Emulation Based Experiments on DETER Testbed 基于仿真实验的DDoS攻击分布特征分析
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_63
Ketki Arora, Krishan Kumar, M. Sachdeva
{"title":"Characterizing DDoS Attack Distributions from Emulation Based Experiments on DETER Testbed","authors":"Ketki Arora, Krishan Kumar, M. Sachdeva","doi":"10.1007/978-3-642-29280-4_63","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_63","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130602994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Generalization Capability of Artificial Neural Network Incorporated with Pruning Method 结合剪枝方法的人工神经网络泛化能力研究
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_19
S. Urolagin, K. Prema, N. Reddy
{"title":"Generalization Capability of Artificial Neural Network Incorporated with Pruning Method","authors":"S. Urolagin, K. Prema, N. Reddy","doi":"10.1007/978-3-642-29280-4_19","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_19","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115380888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Intrusion Detection Technique for Wormhole and Following Jellyfish and Byzantine Attacks in Wireless Mesh Network 无线网状网络中虫洞及后续水母攻击和拜占庭攻击的入侵检测技术
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_73
G. Karri, P. S. Thilagam
{"title":"Intrusion Detection Technique for Wormhole and Following Jellyfish and Byzantine Attacks in Wireless Mesh Network","authors":"G. Karri, P. S. Thilagam","doi":"10.1007/978-3-642-29280-4_73","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_73","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124653140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信