ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
Modeling privacy compromise: visibility of individuals via DRM and RFID in ubiquitous computing
Proceedings of the 2008 Spring simulation multiconference
International Journal of Advanced Pervasive and Ubiquitous Computing
Hi-index | 0.00 |
Network-based Intrusion Detection Systems (IDSs) are designed to monitor potential attacks in network infrastructures. IDSs trigger alerts of potential attacks in network security. These alerts are examined by security analysts to see if they are benign ...