Conference on Network Security & Applications最新文献

筛选
英文 中文
Detection and Classification of DDoS Attacks Using Fuzzy Inference System 基于模糊推理系统的DDoS攻击检测与分类
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_25
T. Subbulakshmi, S. Shalinie, C. S. Reddy, A. Ramamoorthi
{"title":"Detection and Classification of DDoS Attacks Using Fuzzy Inference System","authors":"T. Subbulakshmi, S. Shalinie, C. S. Reddy, A. Ramamoorthi","doi":"10.1007/978-3-642-14478-3_25","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_25","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133557269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
TRING: A New Framework for Efficient Group Key Distribution for Dynamic Groups TRING:一种新的动态群密钥有效分配框架
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_6
D. Raju, Valli Kumari Vatsavayi
{"title":"TRING: A New Framework for Efficient Group Key Distribution for Dynamic Groups","authors":"D. Raju, Valli Kumari Vatsavayi","doi":"10.1007/978-3-642-14478-3_6","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_6","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131044574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ensured Quality of Admitted Voice Calls through Authorized VoIP Networks 确保通过授权的VoIP网络接收语音呼叫的质量
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_14
T. Subashri, B. Kumar, V. Vaidehi
{"title":"Ensured Quality of Admitted Voice Calls through Authorized VoIP Networks","authors":"T. Subashri, B. Kumar, V. Vaidehi","doi":"10.1007/978-3-642-14478-3_14","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_14","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115147448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Power Adjustment Approach for Multi-channel Multi-AP Deployment Using Cognitive Radio Concept 基于认知无线电概念的多通道多ap部署功率调整方法
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_30
Prabhat Kumar Tiwary, Niwas Maskey, S. Khakurel
{"title":"A Power Adjustment Approach for Multi-channel Multi-AP Deployment Using Cognitive Radio Concept","authors":"Prabhat Kumar Tiwary, Niwas Maskey, S. Khakurel","doi":"10.1007/978-3-642-14478-3_30","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_30","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116154969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Classification for More Reliable Steganalysis 更可靠的隐写分析图像分类
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_7
R. Shreelekshmi, M. Wilscy, C. Madhavan
{"title":"Image Classification for More Reliable Steganalysis","authors":"R. Shreelekshmi, M. Wilscy, C. Madhavan","doi":"10.1007/978-3-642-14478-3_7","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_7","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122899613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Proxy Re-signature Scheme That Translates One Type of Signature Scheme to Another Type of Signature Scheme 代理重签名方案将一种签名方案转换为另一种签名方案
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_28
N. Sunitha, B. B. Amberker
{"title":"Proxy Re-signature Scheme That Translates One Type of Signature Scheme to Another Type of Signature Scheme","authors":"N. Sunitha, B. B. Amberker","doi":"10.1007/978-3-642-14478-3_28","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_28","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116827781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
VLSI Design and Implementation of Combined Secure Hash Algorithm SHA-512 组合安全哈希算法SHA-512的VLSI设计与实现
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_11
R. Kayalvizhi, R. Subramanian, R. Santhosh, J. Gurubaran, V. Vaidehi
{"title":"VLSI Design and Implementation of Combined Secure Hash Algorithm SHA-512","authors":"R. Kayalvizhi, R. Subramanian, R. Santhosh, J. Gurubaran, V. Vaidehi","doi":"10.1007/978-3-642-14478-3_11","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_11","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116978982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Flow Based Slow and Fast Scan Detection System 基于流的慢速和快速扫描检测系统
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_20
N. Muraleedharan, Arun Parmar
{"title":"A Flow Based Slow and Fast Scan Detection System","authors":"N. Muraleedharan, Arun Parmar","doi":"10.1007/978-3-642-14478-3_20","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_20","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132487975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On Analyzing the Degree of Coldness in Iowa, a North Central Region, United States: An XML Exploitation in Spatial Databases 美国中北部爱荷华州寒冷程度分析——基于XML的空间数据库开发
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_62
Sugam Sharma, S. Gadia
{"title":"On Analyzing the Degree of Coldness in Iowa, a North Central Region, United States: An XML Exploitation in Spatial Databases","authors":"Sugam Sharma, S. Gadia","doi":"10.1007/978-3-642-14478-3_62","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_62","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133975041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Towards Designing Application Specific Trust Treated Model 面向特定应用的信任处理模型设计
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_55
Farag Azzedin, Sajjad Mahmood
{"title":"Towards Designing Application Specific Trust Treated Model","authors":"Farag Azzedin, Sajjad Mahmood","doi":"10.1007/978-3-642-14478-3_55","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_55","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127877761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信