Computational Science and Its Applications: ICCSA ..., International Conference : Proceedings, 3. daļaSpringer, 2003 |
Saturs
A Security Requirement Management Database Based on ISOIEC | 1 |
CTOBIBased Pitch Accent Prediction Using MaximumEntropy | 23 |
PGNIDSPatternGraph Based Network Intrusion Detection System | 38 |
Autortiesības | |
73 citas sadaļas nav parādītas.
Citi izdevumi - Skatīt visu
Bieži izmantoti vārdi un frāzes
adversary algorithm analysis AODV applied architecture attack authentication Berlin Heidelberg 2006 blind signatures block block cipher buffer cipher cluster head collision resistant component Computer constraints cost defined detection efficient encryption evaluation fuzzy Gavrilova Genetic Algorithm hash function heuristic ICCSA IEEE implementation input integrated inventory IP address IPv4 IPv6 keystream Korea layer linear LNCS machine method minimize mobile module neural network node NP-hard objective ontology operation optimal solution output packet paper parameter password pattern performance pitch accent problem production proposed protocol provably secure public key random Research RFID router routing Section selected sensor sequence server setup signature scheme simulation skip lists solve Springer-Verlag Berlin Heidelberg Step stream cipher subnet Table tabu search technique Theorem traffic variables vector weight wireless