International Conference on Advanced Computing, Networking and Security最新文献

筛选
英文 中文
A Robust Defense Mechanism to Prevent Phishing Attack Using Parse Tree Validation 基于解析树验证的网络钓鱼防御机制研究
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_64
V. Shanmughaneethi, Regan Abraham, S. Swamynathan
{"title":"A Robust Defense Mechanism to Prevent Phishing Attack Using Parse Tree Validation","authors":"V. Shanmughaneethi, Regan Abraham, S. Swamynathan","doi":"10.1007/978-3-642-29280-4_64","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_64","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126262862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient Variable Size Template Matching Using Fast Normalized Cross Correlation on Multicore Processors 基于快速归一化互相关的多核处理器可变大小模板匹配
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_26
D. Gangodkar, Sachin Gupta, G. S. Gill, Padam Kumar, A. Mittal
{"title":"Efficient Variable Size Template Matching Using Fast Normalized Cross Correlation on Multicore Processors","authors":"D. Gangodkar, Sachin Gupta, G. S. Gill, Padam Kumar, A. Mittal","doi":"10.1007/978-3-642-29280-4_26","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_26","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125564750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Cost Effective Region-Based Group Key Agreement Protocol for Ad Hoc Networks Using Elliptic Curve Cryptography 基于椭圆曲线加密的低成本区域组密钥协商协议
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_59
Krishnan Kumar, J. Begum, V. Sumathy
{"title":"Cost Effective Region-Based Group Key Agreement Protocol for Ad Hoc Networks Using Elliptic Curve Cryptography","authors":"Krishnan Kumar, J. Begum, V. Sumathy","doi":"10.1007/978-3-642-29280-4_59","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_59","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129804222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of AODV and DSR Routing Protocols for Ad-Hoc Networks Ad-Hoc网络中AODV和DSR路由协议的性能分析
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_36
Anshuman Biswas, Banani Saha, S. Guha
{"title":"Performance Analysis of AODV and DSR Routing Protocols for Ad-Hoc Networks","authors":"Anshuman Biswas, Banani Saha, S. Guha","doi":"10.1007/978-3-642-29280-4_36","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_36","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114121608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Recent Advancements in Parallel Algorithms for String Matching on Computing Models - A Survey and Experimental Results 计算模型上字符串匹配并行算法的研究进展——综述与实验结果
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_32
C. Someswararao, K. B. Raju, S. Appaji, S. Raju, K. Reddy
{"title":"Recent Advancements in Parallel Algorithms for String Matching on Computing Models - A Survey and Experimental Results","authors":"C. Someswararao, K. B. Raju, S. Appaji, S. Raju, K. Reddy","doi":"10.1007/978-3-642-29280-4_32","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_32","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114593419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
SLA - Driven Dynamic Resource Allocation on Clouds SLA驱动的云上动态资源分配
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_2
G. Siddesh, K. Srinivasa
{"title":"SLA - Driven Dynamic Resource Allocation on Clouds","authors":"G. Siddesh, K. Srinivasa","doi":"10.1007/978-3-642-29280-4_2","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_2","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115002765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Sensitive Attribute Based Clustering Method for k-Anonymization 基于敏感属性的k-匿名聚类方法
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_18
P. Bhaladhare, D. Jinwala
{"title":"A Sensitive Attribute Based Clustering Method for k-Anonymization","authors":"P. Bhaladhare, D. Jinwala","doi":"10.1007/978-3-642-29280-4_18","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_18","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130745295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Digital Microscopic Bacterial Cell Growth Analysis and Cell Division Time Determination for Escherichia coli Using Fuzzy Inference System 模糊推理系统用于大肠杆菌数字显微细菌细胞生长分析和细胞分裂时间测定
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_23
P. Hiremath, Parashuram Bannigidad
{"title":"Digital Microscopic Bacterial Cell Growth Analysis and Cell Division Time Determination for Escherichia coli Using Fuzzy Inference System","authors":"P. Hiremath, Parashuram Bannigidad","doi":"10.1007/978-3-642-29280-4_23","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_23","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120967469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Bit-Based Fairness in IEEE802.11p MAC for Vehicle-to-Infrastructure Networks 车对基础设施网络IEEE802.11p MAC中基于位的公平性
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_39
V. P. Harigovindan, A. Babu, L. Jacob
{"title":"Bit-Based Fairness in IEEE802.11p MAC for Vehicle-to-Infrastructure Networks","authors":"V. P. Harigovindan, A. Babu, L. Jacob","doi":"10.1007/978-3-642-29280-4_39","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_39","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121808301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Clustering Biological Data Using Voronoi Diagram 利用Voronoi图聚类生物数据
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_21
D. Edla, P. K. Jana
{"title":"Clustering Biological Data Using Voronoi Diagram","authors":"D. Edla, P. K. Jana","doi":"10.1007/978-3-642-29280-4_21","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_21","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126597509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信