Network Security
Network Security
no
1.
Title
SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks Nymble: Blocking Misbehaving Users in Anonymizing Networks A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning Tree Online Intrusion Alert Aggregation with Generative Data Stream Modeling.
Domain
Secure Computing (Transaction) Secure Computing (Transaction) Secure Computing (Transaction) Secure Computing (Transaction) Secure Computing (Transaction) Secure Computing (Conference) Image Processing & Secure computing (Transaction) Secure Computing (Conference) Secure Computing (Conference) Secure Computing (Conference) Image Processing & Secure computing (Transaction) Image Processing (Transaction) Image Processing & Secure computing (Transaction) Secure Computing (Conference) Secure Computing (Conference)
Year
2011
2.
2011
3.
2011
2011
4.
Anomaly Detection in Network Traffic Based on Statistical Inference and Stable Modeling Self-Organizing Feature Maps for User-to-Root and Remoteto Local Network Intrusion Detection on the KDD Cup 1999 Dataset
2011
2011
5.
2011
Architecting a Secure Enterprise Data Sharing. 6. Construction P2P firewall HTTP-Botnet defense mechanism A Hierarchical Hybrid Structure for Botnet Control and Command. Robust Video Data Hiding Using Forbidden Zone Data Hiding And Selective Embedding An Optimal Data Hiding Scheme With Tree-Based Parity Check Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error 8. A Competitive Study of Cryptography Techniques over Block Cipher. Analysis on Credit Card Fraud Detection Methods.
7.
2011
2011
2011
9.
2011
10.
Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks Intrusion detection An Energy efficient approach
Secure Computing (Transaction) Secure Computing (Conference) Image Processing & Secure Computing (Transaction) Secure Computing (Transaction) Secure Computing (Transaction)
2011
11.
2011
12.
Lossy Compression and Iterative Reconstruction for Encrypted Image Nymble- Blocking Misbehaving Users in Anonymizing Networks Modeling and Detection of Camouflaging Worm
2011
13.
2011
14.
2011