[图书][B] Security for Multihop Wireless Networks

S Khan, JL Mauri, S Adibi - 2014 - api.taylorfrancis.com
First of all, we would like to express our gratitude to the publisher Taylor & Francis for giving
us full support in the timely completion of this book. We also thank all the authors for their …

Taxonomy and holistic detection of security attacks in MANETs

P García-Teodoro, L Sánchez-Casado… - Security for …, 2014 - api.taylorfrancis.com
Taxonomy and Holistic Detection of Security Attacks in MANETs Page 1 3 Chapter 1
Taxonomy and Holistic Detection of Security Attacks in MANETs P. García-Teodoro, L …

[PDF][PDF] An android application for farmers to disseminate horticulture information

VB Patel, RG Thakkar, BL Radadiya - International Journal of Computer …, 2014 - Citeseer
Today's the mobile phone is used worldwide. As the price of smart phone is decreasing, its
popularity is increasing day by day. Moreover, android is the mobile operating system used …

[PDF][PDF] Ad-hoc Retrieval on FIRE data set with TF-IDF and Probabilistic Models

CS Jangid, SK Vishwakarma, KI Lakhtaria - International Journal of …, 2014 - Citeseer
Information Retrieval is finding documents of unstructured nature which should satisfy user's
information needs. There exist various models for weighting terms of corpus documents and …

A multiagent self-healing system against security incidents in MANETs

R Magán-Carrión, J Camacho-Páez… - Highlights of Practical …, 2014 - Springer
Few proposals exist in the literature where security in networks and communications is
studied from a pro-active perspective. One of them is MARS, a self-healing system intended …

[PDF][PDF] A distance based static index pruning method for phrase terms

SK Vishwakarma, D Bhatnagar, K Lakhtaria, Y Vyas - researchgate.net
This paper proposes a static index pruning method for phrase queries based on term
distance. It models the terms distance within document as a measure to find the term co …

Protocolo para la Notificacion y Alerta de Eventos de Seguridad en Redes Ad-hoc

L Sánchez Casado, R Magán Carrión… - 2014 - rua.ua.es
Las líneas de defensa de seguridad tradicionales para proteger un sistema dado son
prevención, detección y respuesta. A pesar de que sobre el papel dichos módulos deben …

[图书][B] Detección de instrusiones multi-capa basada en anomalías en entornos MANET

L Sánchez Casado - 2014 - digibug.ugr.es
Es innegable la importancia hoy en dıa de las redes de comunicación en multitud de las
actividades diarias de la sociedad actual. Entre las distintas tecnologıas existentes, las …