Results 1 to 10 of about 496,455 (205)

Intrusive and non-intrusive watermarking [PDF]

open access: yesProceedings. International Conference on Image Processing, 2003
"Can we watermark without perturbing an image?" We present the salient results of an investigation carried out to find an answer to this question. We judge candidate watermarking schemes based on transparency, robustness, capacity and non-invertibility, together referred to as the governing factors. We refer to schemes that embed by perturbing an image
Krishna, Hari VJ, Ramakrishnan, KR
openaire   +2 more sources

Autonomic Parameter Tuning of Anomaly-Based IDSs: an SSH Case Study [PDF]

open access: yes, 2012
Anomaly-based intrusion detection systems classify network traffic instances by comparing them with a model of the normal network behavior. To be effective, such systems are expected to precisely detect intrusions (high true positive rate) while limiting
Boer, Pieter-Tjerk de   +4 more
core   +9 more sources

A taxonomy of malicious traffic for intrusion detection systems [PDF]

open access: yes, 2018
With the increasing number of network threats it is essential to have a knowledge of existing and new network threats to design better intrusion detection systems.
Atkinson, Robert   +5 more
core   +4 more sources

Intrusion and extrusion of water in hydrophobic nanopores [PDF]

open access: yes, 2017
Heterogeneous systems composed of hydrophobic nanoporous materials and water are capable, depending on their characteristics, of efficiently dissipating (dampers) or storing ("molecular springs") energy.
Casciola, Carlo Massimo   +3 more
core   +1 more source

Toward Network-based DDoS Detection in Software-defined Networks [PDF]

open access: yes, 2018
To combat susceptibility of modern computing systems to cyberattack, identifying and disrupting malicious traffic without human intervention is essential.
Chaves Luciano Jerez   +4 more
core   +1 more source

Intrusion Detection Systems for Community Wireless Mesh Networks [PDF]

open access: yes, 2008
Wireless mesh networks are being increasingly used to provide affordable network connectivity to communities where wired deployment strategies are either not possible or are prohibitively expensive.
Hutchison, David   +3 more
core   +1 more source

Intrusion and intrusion detection [PDF]

open access: yesInternational Journal of Information Security, 2001
Summary: Assurance technologies for computer security have failed to have significant impacts in the marketplace, with the result that most of the computers connected to the internet are vulnerable to attack. This paper looks at the problem of malicious users from both a historical and practical standpoint.
openaire   +2 more sources

Fault and magmatic interaction within Iceland's western rift over the last 9kyr [PDF]

open access: yes, 2003
We present high-resolution 'Chirp' sub-bottom profiler data from Thingvallavatn, a lake in Iceland's western rift zone. These data are combined with stratigraphic constraints from sediment cores to show that movement on normal faults since 9 ka are ...
A. I. Best   +13 more
core   +1 more source

Giant osmotic pressure in the forced wetting of hydrophobic nanopores [PDF]

open access: yes, 2015
The forced intrusion of water in hydrophobic nanoporous pulverulent material is of interest for quick storage of energy. With nanometric pores the energy storage capacity is controlled by interfacial phenomena.
Charlaix, Elisabeth   +3 more
core   +3 more sources

Layered Intrusions

open access: yes, 2015
This edited work contains the most recent advances related to the study of layered intrusions and cumulate rocks formation. The first part of this book presents reviews and new views of processes producing the textural, mineralogical and geochemical characteristics of layered igneous rocks.
Charlier, Bernard   +3 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy