Search alternatives:
communication documentation » communication foundation, communication conversation
based dimensions » based dimension, basic dimensions, based dimensioning
dimensions data » dimension data, dimensional data, dimensions dark
data attacks » dpa attacks, day attacks, ddos attacks
1
Published 2015
Table of Contents: ... Approach for Distributed Denial of Service Attack in Wireless Sensor Network -- Location based Coordinated...
View full text
Electronic eBook
2
Published 2015
Table of Contents: ... using a Graph based Approach to Implicitly Find Influential Users -- Ensuring Data Security...
View full text
Electronic eBook
3
Published 2013
Table of Contents: ...Adhoc and Sensor Networks -- Perspectives of Sybil Attack in Routing Protocols of Mobile Ad Hoc...
View full text
Electronic eBook
4
Published 2012
Table of Contents: ... Wireless Communication -- A Novel Frequency Drift Tracking Algorithm Based on Kalman Filter in 60GHz mm...
View full text
Electronic eBook
5
Published 2007
Table of Contents: ... and Consolidation in Transport Logistics Based on Multi-agent Clustering -- Intelligent Agents for Real Time Data...
View full text
Electronic eBook
6
Published 2015
Table of Contents: ... Profiling -- Cyber Attribution: An Argumentation-Based Approach -- The Human Factor in Cybersecurity: Robust...
View full text
Electronic eBook
7
Published 2013
Table of Contents: ... Structure for Frequent Pattern Mining of Uncertain Data -- Frequent Pattern Mining in Attributed Trees...
View full text
Electronic eBook
8
Published 2006
Table of Contents: ... Communication -- Embodied Conversational Agents: Computing and Rendering Realistic Gaze Patterns -- DBN Based...
View full text
Electronic eBook
9
Published 2007
Table of Contents: ... and Attacks -- Masquerade Detection Based Upon GUI User Profiling in Linux Systems -- One-Time Receiver...
View full text
Electronic eBook
10
Published 2006
Table of Contents: ...-Goethals-Like Codes and Variants of Cyclotomic Polynomials -- Space-Time Code Designs Based...
View full text
Electronic eBook
11
Published 2010
Table of Contents: ... Computing -- Consistently Handling Geographical User Data -- Intelligent Databases -- A Model Based...
View full text
Electronic eBook
12
Published 2010
Table of Contents: ... with Reduced Dimension Using Data Mining Classification Methods and Their Performance Comparison -- Recognition...
View full text
Electronic eBook
13
Published 2010
Table of Contents: ... -- Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks -- Protecting...
View full text
Electronic eBook
14
Published 2010
Table of Contents: ... and Multivariate Schemes -- Partial Key Exposure Attack on RSA – Improvements for Limited Lattice Dimensions...
View full text
Electronic eBook
15
Published 2007
Table of Contents: ... Networks Based on Learning Automata -- Fast and Effective Dimensioning Algorithm for End-to-End Optical...
View full text
Electronic eBook
16
Published 2013
Table of Contents: ... MATLAB -- Tumor Mass Identification Based on Surface Analysis and Fractal Dimensions -- Mean-Shift...
View full text
Electronic eBook
17
Published 2005
Table of Contents: ... Semantics from Dance Videos -- BioPubMiner: Machine Learning Component-Based Biomedical Information Analysis...
View full text
Electronic eBook
18
Published 2012
Table of Contents: ... -- Design of an Application-Dependent Static-Based Shared Memory Network -- Determining Quality of S-Boxes...
View full text
Electronic eBook
19
Published 2012
Table of Contents: ... Computing for the Resiliency of Protecting from Internal Attacks in Distributed Wireless Sensor -- Parallel...
View full text
Electronic eBook
20
Published 2008
Table of Contents: ... for Source Camera Identification -- Data Recovery from Windows CE Based Handheld Devices -- Legal Issues...
View full text
Electronic eBook