Android Malware Detection Approaches in Combination with Static and Dynamic Features. | 0 | 0.34 | 2019 |
A resilient routing approach for Mobile Ad Hoc Networks | 0 | 0.34 | 2015 |
Permission-based malware detection mechanisms for smart phones | 2 | 0.45 | 2014 |
An efficient and secure approach for a cloud collaborative editing | 6 | 0.50 | 2013 |
A study on the data privacy and operation performance for cloud collaborative editing systems | 1 | 0.36 | 2012 |
A study on the prevention of sniffing nodes in mobile ad hoc networks | 0 | 0.34 | 2011 |
Genetic-fuzzy association rules for network intrusion detection systems | 1 | 0.35 | 2011 |
The Research of Locating Methods for Mobile Stations Based on IEEE 802.16e Multi-hop WMANs | 0 | 0.34 | 2011 |
Using clustering to improve the KNN-based classifiers for online anomaly network traffic identification | 15 | 0.63 | 2011 |
A novel intrusion detection system based on hierarchical clustering and support vector machines | 110 | 3.16 | 2011 |
Real-time anomaly detection systems for Denial-of-Service attacks by weighted k-nearest-neighbor classifiers | 16 | 0.64 | 2011 |
Deployment of intrusion detection nodes to prevent wormhole attacks in Mobile Ad hoc Networks | 4 | 0.47 | 2011 |
Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems | 53 | 1.98 | 2011 |
Using Genetic Algorithm to Improve an Online Response System for Anomaly Traffic by Incremental Mining | 0 | 0.34 | 2010 |
An online response system for anomaly traffic by incremental mining with genetic optimization. | 2 | 0.36 | 2010 |
WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks | 30 | 1.18 | 2010 |
Mitigation of Black-Hole Nodes in Mobile Ad Hoc Networks | 6 | 0.51 | 2010 |
Discovery and prevention of attack episodes by frequent episodes mining and finite state machines | 8 | 0.52 | 2010 |
Prevention of wormhole attacks in mobile ad hoc networks by intrusion detection nodes | 4 | 0.45 | 2010 |
Design of an adaptive positioning system based on WiFi radio signals | 13 | 0.76 | 2009 |
A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach | 26 | 0.97 | 2009 |
Attack Patterns Discovery by Frequent Episodes Mining from Honeypot Systems | 0 | 0.34 | 2009 |
A Real-Time Network Intrusion Detection System Based On Incremental Mining Approach | 1 | 0.36 | 2008 |
Feature Weighting and Selection for a Real-Time Network Intrusion Detection System Based on GA with KNN | 6 | 0.50 | 2008 |
Using Incremental Mining to Generate Fuzzy Rules for Real-Time Network Intrusion Detection Systems | 1 | 0.41 | 2008 |
Anomaly Detection For Web Server Based On Smooth Support Vector Machine | 1 | 0.36 | 2008 |
An Efficient and Secured Internet Key Exchange Protocol Design | 2 | 0.38 | 2007 |
A Surveillance Spyware Detection System Based on Data Mining Methods | 5 | 0.48 | 2006 |
An E-Mail Client Implementation with Spam Filtering and Security Mechanisms | 0 | 0.34 | 2005 |
A general broadcasting scheme for recursive networks with complete connection | 3 | 0.42 | 2001 |
Node-disjoint paths in incomplete WK-recursive networks | 2 | 0.41 | 2000 |
Topological properties of incomplete WK-recursive networks | 5 | 0.46 | 1998 |
A shortest path routing algorithm for incomplete WK-recursive networks | 10 | 0.61 | 1997 |
Broadcasting on incomplete WK-recursive networks | 10 | 0.74 | 1996 |
A Multicast Algorithm for Hypercube Multiprocessors | 19 | 1.49 | 1994 |