Facet browsing currently unavailable
Page 1 of 2880 results
Sort by: relevance publication year
Multi Layer Cyber Attack Detection through Honeynet PROCEEDINGS ARTICLE published November 2008 in 2008 New Technologies, Mobility and Security |
Correlating Multi-Step Attack and Constructing Attack Scenarios Based on Attack Pattern Modeling PROCEEDINGS ARTICLE published April 2008 in 2008 International Conference on Information Security and Assurance (isa 2008) |
Multi-Stage Intrusion Detection System Using Hidden Markov Model Algorithm PROCEEDINGS ARTICLE published January 2008 in 2008 International Conference on Information Science and Security (ICISS 2008) |
XSS Attack Methods BOOK CHAPTER published 2008 in InfoSecurity 2008 Threat Analysis |
A Flexible Approach to Measuring Network Security Using Attack Graphs PROCEEDINGS ARTICLE published 2008 in 2008 International Symposium on Electronic Commerce and Security |
Formal Modelling and Validation of a Novel Energy Efficient Cross-Layer MAC Protocol in Wireless Multi Hop Sensor Networks Using Time Petri Nets PROCEEDINGS ARTICLE published November 2008 in 2008 New Technologies, Mobility and Security |
A novel session layer protocol with enhanced rate and passive and active attack detection capabilities in quantum communication PROCEEDINGS ARTICLE published March 2008 in 2008 National Radio Science Conference |
60-GHz multi-layer parasitic microstrip array antenna with stacked rings using multi-layer LTCC substrate PROCEEDINGS ARTICLE published January 2008 in 2008 IEEE Radio and Wireless Symposium |
A Heuristic Approach to Minimum-Cost Network Hardening Using Attack Graph PROCEEDINGS ARTICLE published November 2008 in 2008 New Technologies, Mobility and Security |
Detection of subsurface Qanats by Multi Layer Perceptron Neural Network via Microgravity data PROCEEDINGS ARTICLE published 7 April 2008 in Proceedings |
Estimating multi-layer scattering in faces using direct-indirect separation PROCEEDINGS ARTICLE published 11 August 2008 in ACM SIGGRAPH 2008 talks |
Failure mitigation of semi active multi beam antenna array for portable surveillance radar using genetic algorithm PROCEEDINGS ARTICLE published May 2008 in 2008 IEEE Radar Conference |
Substantiating Security Threats Using Group Outlier Detection Techniques PROCEEDINGS ARTICLE published 2008 in IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference |
Jamming ACK Attack to Wireless Networks and a Mitigation Approach PROCEEDINGS ARTICLE published 2008 in IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference |
Security in all-optical networks: Failure and attack avoidance using self-organization PROCEEDINGS ARTICLE published December 2008 in 2008 2nd ICTON Mediterranean Winter |
Multi-target detection using noise-like signals PROCEEDINGS ARTICLE published May 2008 in 2008 IEEE Radar Conference |
Cross-layer attack on anonymizing networks PROCEEDINGS ARTICLE published June 2008 in 2008 International Conference on Telecommunications |
An Evaluation of a Security Mechanism Response Time Using a General Purpose OS for a Multi-hop Network PROCEEDINGS ARTICLE published December 2008 in 2008 IEEE International Symposium on Parallel and Distributed Processing with Applications |
Low-Complexity Detection by Exploiting Suboptimal Detection Order and Subcarrier Grouping for Multi-Layer MIMO-OFDM PROCEEDINGS ARTICLE published May 2008 in ICC Workshops - 2008 IEEE International Conference on Communications Workshops |
Improvement in minority attack detection with skewness in network traffic PROCEEDINGS ARTICLE published 16 March 2008 in SPIE Proceedings |