An Optimized Information-Preserving Relational Database Watermarking Scheme for Ownership Protection of Medical Data. | 0 | 0.34 | 2018 |
A Comprehensive Survey of Watermarking Relational Databases Research. | 0 | 0.34 | 2018 |
Sboxscope: A Meta S-Box Strength Evaluation Framework For Heterogeneous Confusion Boxes | 0 | 0.34 | 2016 |
Secure biometric template generation for multi-factor authentication. | 20 | 1.08 | 2015 |
Securing SIP-based VoIP infrastructure against flooding attacks and Spam Over IP Telephony. | 11 | 0.59 | 2014 |
In-execution dynamic malware analysis and detection by mining information in process control blocks of Linux OS | 11 | 0.79 | 2013 |
A Robust, Distortion Minimizing Technique for Watermarking Relational Databases Using Once-for-All Usability Constraints | 10 | 0.54 | 2013 |
A Formal Usability Constraints Model for Watermarking of Outsourced Datasets | 2 | 0.39 | 2013 |
BeeSensor: An energy-efficient and scalable routing protocol for wireless sensor networks | 31 | 1.06 | 2012 |
An Information-Preserving Watermarking Scheme for Right Protection of EMR Systems | 8 | 0.50 | 2012 |
ELF-Miner: using structural knowledge and data mining methods to detect new (Linux) malicious executables | 11 | 0.62 | 2012 |
Embedding High Capacity Covert Channels in Short Message Service (SMS) | 2 | 0.41 | 2011 |
OG-Miner: An Intelligent Health Tool for Achieving Millennium Development Goals (MDGs) in m-Health Environments | 3 | 0.39 | 2011 |
In-Execution Malware Detection Using Task Structures of Linux Processes | 6 | 0.55 | 2011 |
Using evolutionary algorithms for ECG Arrhythmia detection and classification | 4 | 0.51 | 2011 |
Swarm intelligence based routing protocol for wireless sensor networks: Survey and future directions | 120 | 3.50 | 2011 |
On the reliability of ad hoc routing protocols for loss-and-delay sensitive applications | 8 | 0.61 | 2011 |
A Framework for Detecting Malformed SMS Attack | 0 | 0.34 | 2011 |
Using evolutionary learning classifiers to do MobileSpam (SMS) filtering | 4 | 0.41 | 2011 |
On performance modeling of ad hoc routing protocols | 14 | 1.05 | 2010 |
Bee-sensor: a step towards meta-routing strategies in hybrid ad hoc networks | 2 | 0.38 | 2010 |
RTP-miner: a real-time security framework for RTP fuzzing attacks | 2 | 0.41 | 2010 |
Applications of Evolutionary Computation, EvoApplications 2010: EvoCOMNET, EvoENVIRONMENT, EvoFIN, EvoMUSART, and EvoTRANSLOG, Istanbul, Turkey, April 7-9, 2010, Proceedings, Part II | 45 | 3.98 | 2010 |
Using computational intelligence to identify performance bottlenecks in a computer system | 0 | 0.34 | 2010 |
Malware detection using statistical analysis of byte-level file content | 48 | 1.86 | 2009 |
Classification Potential vs. Classification Accuracy: A Comprehensive Study of Evolutionary Algorithms with Biomedical Datasets | 4 | 0.37 | 2009 |
IMAD: in-execution malware analysis and detection | 19 | 1.41 | 2009 |
Application of evolutionary algorithms in detection of SIP based flooding attacks | 24 | 0.95 | 2009 |
PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime | 55 | 2.31 | 2009 |
A hybrid GA-PSO fuzzy system for user identification on smart phones | 7 | 0.69 | 2009 |
Particle Swarm Optimisation as a Hardware-Oriented Meta-heuristic for Image Analysis | 2 | 0.39 | 2009 |
Guidelines to Select Machine Learning Scheme for Classification of Biomedical Datasets | 18 | 0.95 | 2009 |
Applications of Evolutionary Computing, EvoWorkshops 2009: EvoCOMNET, EvoENVIRONMENT, EvoFIN, EvoGAMES, EvoHOT, EvoIASP, EvoINTERACTION, EvoMUSART, EvoNUM, EvoSTOC, EvoTRANSLOG, Tübingen, Germany, April 15-17, 2009. Proceedings | 88 | 8.30 | 2009 |
On the appropriateness of evolutionary rule learning algorithms for malware detection | 4 | 0.58 | 2009 |
Using Formal Grammar and Genetic Operators to Evolve Malware | 3 | 0.46 | 2009 |
Performance evaluation of evolutionary algorithms in classification of biomedical datasets | 6 | 0.47 | 2009 |
Are evolutionary rule learning algorithms appropriate for malware detection? | 3 | 0.63 | 2009 |
Using spatio-temporal information in API calls with machine learning algorithms for malware detection | 46 | 2.16 | 2009 |
A Sense of `Danger' for Windows Processes | 9 | 0.67 | 2009 |
The Role of Biomedical Dataset in Classification | 11 | 0.57 | 2009 |
Keystroke-Based User Identification on Smart Phones | 44 | 2.01 | 2009 |
A comparative study of fuzzy inference systems, neural networks and adaptive neuro fuzzy inference systems for portscan detection | 3 | 0.46 | 2008 |
Embedded Malware Detection Using Markov n-Grams | 34 | 1.83 | 2008 |
Attack analysis & bio-inspired security framework for IP multimedia subsystem | 5 | 0.49 | 2008 |
Applications of Evolutionary Computing, EvoWorkshops 2008: EvoCOMNET, EvoFIN, EvoHOT, EvoIASP, EvoMUSART, EvoNUM, EvoSTOC, and EvoTransLog, Naples, Italy, March 26-28, 2008. Proceedings | 70 | 6.29 | 2008 |
A Scalable Formal Framework for Analyzing the Behavior of Nature-Inspired Routing Protocols | 0 | 0.34 | 2008 |
Attack analysis & bio-inspired security framework for IPMultimedia subsystem | 1 | 0.41 | 2008 |
Formal Modeling of BeeAdHoc: A Bio-inspired Mobile Ad Hoc Network Routing Protocol | 6 | 0.53 | 2008 |
A sense of danger: dendritic cells inspired artificial immune system for manet security | 6 | 0.56 | 2008 |
A formal performance modeling framework for bio-inspired ad hoc routing protocols | 14 | 0.81 | 2008 |