Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 1 of 2888 results
Sort by: relevance publication year

Multi Layer Cyber Attack Detection through Honeynet

PROCEEDINGS ARTICLE published November 2008 in 2008 New Technologies, Mobility and Security

Authors: J. S. Bhatia | Rakesh Sehgal | Bharat Bhushan | Harneet Kaur

Correlating Multi-Step Attack and Constructing Attack Scenarios Based on Attack Pattern Modeling

PROCEEDINGS ARTICLE published April 2008 in 2008 International Conference on Information Security and Assurance (isa 2008)

Authors: Zhijie Liu | Chongjun Wang | Shifu Chen

Multi-Stage Intrusion Detection System Using Hidden Markov Model Algorithm

PROCEEDINGS ARTICLE published January 2008 in 2008 International Conference on Information Science and Security (ICISS 2008)

Authors: Do-hyeon Lee | Doo-young Kim | Jae-il Jung

XSS Attack Methods

BOOK CHAPTER published 2008 in InfoSecurity 2008 Threat Analysis

Authors: Champ Clark | Larry Chaffin | Anton Chuvakin | Scott Paladino | Dan Dunkel | Seth Fogie | Michael Gregg | Jeremiah Grossman | Robert “RSnake” Hansen | Petko “pdp” D. Petkov | Anton Rager | Craig A. Schiller

A Flexible Approach to Measuring Network Security Using Attack Graphs

PROCEEDINGS ARTICLE published 2008 in 2008 International Symposium on Electronic Commerce and Security

Authors: Chen Feng | Su Jin-Shu

Formal Modelling and Validation of a Novel Energy Efficient Cross-Layer MAC Protocol in Wireless Multi Hop Sensor Networks Using Time Petri Nets

PROCEEDINGS ARTICLE published November 2008 in 2008 New Technologies, Mobility and Security

Authors: Bouabdellah Kechar | Larbi Sekhri

A novel session layer protocol with enhanced rate and passive and active attack detection capabilities in quantum communication

PROCEEDINGS ARTICLE published March 2008 in 2008 National Radio Science Conference

Authors: Sherif A. Halawa | Hassan M. Elkamchouchi

A Heuristic Approach to Minimum-Cost Network Hardening Using Attack Graph

PROCEEDINGS ARTICLE published November 2008 in 2008 New Technologies, Mobility and Security

Authors: Tania Islam | Lingyu Wang

60-GHz multi-layer parasitic microstrip array antenna with stacked rings using multi-layer LTCC substrate

PROCEEDINGS ARTICLE published January 2008 in 2008 IEEE Radio and Wireless Symposium

Authors: Tomohiro Seki | Kenjiro Nishikawa | Kazuyasu Okada

Importance of Boundary Layer Transition in a High-Pressure Turbine Cascade Using LES

PROCEEDINGS ARTICLE published 11 June 2018 in Volume 2C: Turbomachinery

Authors: Luis M. Seguí | L. Y. M. Gicquel | F. Duchaine | J. de Laborderie

Detection of subsurface Qanats by Multi Layer Perceptron Neural Network via Microgravity data

PROCEEDINGS ARTICLE published 7 April 2008 in Proceedings

Authors: A. Hajian | H. Zomorrodian | C. Lucas

Estimating multi-layer scattering in faces using direct-indirect separation

PROCEEDINGS ARTICLE published 11 August 2008 in ACM SIGGRAPH 2008 talks

Authors: Abhijeet Ghosh | Paul Debevec

Failure mitigation of semi active multi beam antenna array for portable surveillance radar using genetic algorithm

PROCEEDINGS ARTICLE published May 2008 in 2008 IEEE Radar Conference

Authors: Shubha Elizabeth Avirah | Anil Kumar Singh

Substantiating Security Threats Using Group Outlier Detection Techniques

PROCEEDINGS ARTICLE published 2008 in IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference

Authors: Elankayer Sithirasenan | Vallipuram Muthukkumarasamy

Jamming ACK Attack to Wireless Networks and a Mitigation Approach

PROCEEDINGS ARTICLE published 2008 in IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference

Authors: Zhiguo Zhang | Jingqi Wu | Jing Deng | Meikang Qiu

Optimization of Compressor Variable Geometry Settings Using Multi-Fidelity Simulation

PROCEEDINGS ARTICLE published 15 June 2015 in Volume 2C: Turbomachinery

Authors: S. Reitenbach | M. Schnös | R.-G. Becker | T. Otten

Security in all-optical networks: Failure and attack avoidance using self-organization

PROCEEDINGS ARTICLE published December 2008 in 2008 2nd ICTON Mediterranean Winter

Authors: Gerardo Castanon | Ivan Razo-Zapata | Carlos Mex | Raul Ramirez-Velarde | Ozan Tonguz

Cross-layer attack on anonymizing networks

PROCEEDINGS ARTICLE published June 2008 in 2008 International Conference on Telecommunications

Authors: Andriy Panchenko | Lexi Pimenidis

LPC Blade and Non-Axisymmetric Hub Profiling Optimization Using Multi-Fidelity Non-Intrusive POD Surrogates

PROCEEDINGS ARTICLE published 26 June 2017 in Volume 2C: Turbomachinery

Authors: Tariq Benamara | Piotr Breitkopf | Ingrid Lepot | Caroline Sainvitu

Investigation of the Suction Side Boundary Layer Development on Low Pressure Turbine Airfoils With and Without Separation Using a Preston Probe

PROCEEDINGS ARTICLE published 16 June 2014 in Volume 2C: Turbomachinery

Authors: Stephan Stotz | Christian T. Wakelam | Reinhard Niehuis | Yavuz Guendogdu