Facet browsing currently unavailable
Page 1 of 2888 results
Sort by: relevance publication year
Multi Layer Cyber Attack Detection through Honeynet PROCEEDINGS ARTICLE published November 2008 in 2008 New Technologies, Mobility and Security |
Correlating Multi-Step Attack and Constructing Attack Scenarios Based on Attack Pattern Modeling PROCEEDINGS ARTICLE published April 2008 in 2008 International Conference on Information Security and Assurance (isa 2008) |
Multi-Stage Intrusion Detection System Using Hidden Markov Model Algorithm PROCEEDINGS ARTICLE published January 2008 in 2008 International Conference on Information Science and Security (ICISS 2008) |
XSS Attack Methods BOOK CHAPTER published 2008 in InfoSecurity 2008 Threat Analysis |
A Flexible Approach to Measuring Network Security Using Attack Graphs PROCEEDINGS ARTICLE published 2008 in 2008 International Symposium on Electronic Commerce and Security |
Formal Modelling and Validation of a Novel Energy Efficient Cross-Layer MAC Protocol in Wireless Multi Hop Sensor Networks Using Time Petri Nets PROCEEDINGS ARTICLE published November 2008 in 2008 New Technologies, Mobility and Security |
A novel session layer protocol with enhanced rate and passive and active attack detection capabilities in quantum communication PROCEEDINGS ARTICLE published March 2008 in 2008 National Radio Science Conference |
A Heuristic Approach to Minimum-Cost Network Hardening Using Attack Graph PROCEEDINGS ARTICLE published November 2008 in 2008 New Technologies, Mobility and Security |
60-GHz multi-layer parasitic microstrip array antenna with stacked rings using multi-layer LTCC substrate PROCEEDINGS ARTICLE published January 2008 in 2008 IEEE Radio and Wireless Symposium |
Importance of Boundary Layer Transition in a High-Pressure Turbine Cascade Using LES PROCEEDINGS ARTICLE published 11 June 2018 in Volume 2C: Turbomachinery |
Detection of subsurface Qanats by Multi Layer Perceptron Neural Network via Microgravity data PROCEEDINGS ARTICLE published 7 April 2008 in Proceedings |
Estimating multi-layer scattering in faces using direct-indirect separation PROCEEDINGS ARTICLE published 11 August 2008 in ACM SIGGRAPH 2008 talks |
Failure mitigation of semi active multi beam antenna array for portable surveillance radar using genetic algorithm PROCEEDINGS ARTICLE published May 2008 in 2008 IEEE Radar Conference |
Substantiating Security Threats Using Group Outlier Detection Techniques PROCEEDINGS ARTICLE published 2008 in IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference |
Jamming ACK Attack to Wireless Networks and a Mitigation Approach PROCEEDINGS ARTICLE published 2008 in IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference |
Optimization of Compressor Variable Geometry Settings Using Multi-Fidelity Simulation PROCEEDINGS ARTICLE published 15 June 2015 in Volume 2C: Turbomachinery |
Security in all-optical networks: Failure and attack avoidance using self-organization PROCEEDINGS ARTICLE published December 2008 in 2008 2nd ICTON Mediterranean Winter |
Cross-layer attack on anonymizing networks PROCEEDINGS ARTICLE published June 2008 in 2008 International Conference on Telecommunications |
LPC Blade and Non-Axisymmetric Hub Profiling Optimization Using Multi-Fidelity Non-Intrusive POD Surrogates PROCEEDINGS ARTICLE published 26 June 2017 in Volume 2C: Turbomachinery |
Investigation of the Suction Side Boundary Layer Development on Low Pressure Turbine Airfoils With and Without Separation Using a Preston Probe PROCEEDINGS ARTICLE published 16 June 2014 in Volume 2C: Turbomachinery |