Conference on Network Security & Applications最新文献

筛选
英文 中文
Fuzzy Rule-Base Based Intrusion Detection System on Application Layer 基于模糊规则的应用层入侵检测系统
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_3
S. Sangeetha, S. Haripriya, S. G. Mohana Priya, V. Vaidehi, N. Srinivasan
{"title":"Fuzzy Rule-Base Based Intrusion Detection System on Application Layer","authors":"S. Sangeetha, S. Haripriya, S. G. Mohana Priya, V. Vaidehi, N. Srinivasan","doi":"10.1007/978-3-642-14478-3_3","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_3","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114948622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Dynamic Policy Adaptation for Collaborative Groups 协作群体的动态策略适应
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_38
M. Chatterjee, G. Sivakumar
{"title":"Dynamic Policy Adaptation for Collaborative Groups","authors":"M. Chatterjee, G. Sivakumar","doi":"10.1007/978-3-642-14478-3_38","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_38","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114709908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Pipelining Architecture of AES Encryption and Key Generation with Search Based Memory 基于搜索存储器的AES加密和密钥生成的流水线结构
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_23
T. Subashri, R. Arunachalam, B. Kumar, V. Vaidehi
{"title":"Pipelining Architecture of AES Encryption and Key Generation with Search Based Memory","authors":"T. Subashri, R. Arunachalam, B. Kumar, V. Vaidehi","doi":"10.1007/978-3-642-14478-3_23","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_23","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132560547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Analysis of 802.11 Based Cognitive Networks and Cognitive Based 802.11 Networks 基于802.11的认知网络与基于认知的802.11网络分析
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_32
Niwas Maskey, G. Sachdeva
{"title":"Analysis of 802.11 Based Cognitive Networks and Cognitive Based 802.11 Networks","authors":"Niwas Maskey, G. Sachdeva","doi":"10.1007/978-3-642-14478-3_32","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_32","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134161630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Deviation Based Outlier Intrusion Detection System 基于偏差的离群入侵检测系统
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_39
Vikas Pareek, Aditi Mishra, Arpana Sharma, Rashmi Chauhan, S. Bansal
{"title":"A Deviation Based Outlier Intrusion Detection System","authors":"Vikas Pareek, Aditi Mishra, Arpana Sharma, Rashmi Chauhan, S. Bansal","doi":"10.1007/978-3-642-14478-3_39","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_39","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114412251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Trust Based Technique to Isolate Non-forwarding Nodes in DSR Basedmobile Adhoc Networks 基于信任的移动自组网中非转发节点隔离技术
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_13
N. Bhalaji, A. Shanmugam
{"title":"A Trust Based Technique to Isolate Non-forwarding Nodes in DSR Basedmobile Adhoc Networks","authors":"N. Bhalaji, A. Shanmugam","doi":"10.1007/978-3-642-14478-3_13","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_13","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114650963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Conscience-Based Routing in P2P Networks: Preventing Copyright Violations and Social Malaise 基于良心的P2P网络路由:防止侵犯版权和社会不安
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_31
Ankur Gupta
{"title":"Conscience-Based Routing in P2P Networks: Preventing Copyright Violations and Social Malaise","authors":"Ankur Gupta","doi":"10.1007/978-3-642-14478-3_31","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_31","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117192159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection and Recognition of File Masquerading for E-mail and Data Security 电子邮件与数据安全中文件伪装的检测与识别
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_26
R. Dhanalakshmi, C. Chellappan
{"title":"Detection and Recognition of File Masquerading for E-mail and Data Security","authors":"R. Dhanalakshmi, C. Chellappan","doi":"10.1007/978-3-642-14478-3_26","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_26","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123454997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance Evaluation and Detection of Sybil Attacks in Vehicular Ad-Hoc Networks 车载Ad-Hoc网络中Sybil攻击的性能评估与检测
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_47
J. Grover, Deepak Kumar, M. Sargurunathan, M. Gaur, V. Laxmi
{"title":"Performance Evaluation and Detection of Sybil Attacks in Vehicular Ad-Hoc Networks","authors":"J. Grover, Deepak Kumar, M. Sargurunathan, M. Gaur, V. Laxmi","doi":"10.1007/978-3-642-14478-3_47","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_47","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123973423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A New Remote Mutual Authentication Scheme for WI-FI Enabledhand-Held Devices 一种新的支持WI-FI的手持设备远程相互认证方案
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_21
Amutha Prabakar Muniyandi, Rajaram Ramasamy, Indurani
{"title":"A New Remote Mutual Authentication Scheme for WI-FI Enabledhand-Held Devices","authors":"Amutha Prabakar Muniyandi, Rajaram Ramasamy, Indurani","doi":"10.1007/978-3-642-14478-3_21","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_21","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122267203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信