Taxonomy and Holistic Detection of Security Attacks in MANETs Page 1 3 Chapter 1 Taxonomy and Holistic Detection of Security Attacks in MANETs P. García-Teodoro, L …
VB Patel, RG Thakkar, BL Radadiya - International Journal of Computer …, 2014 - Citeseer
Today's the mobile phone is used worldwide. As the price of smart phone is decreasing, its popularity is increasing day by day. Moreover, android is the mobile operating system used …
Information Retrieval is finding documents of unstructured nature which should satisfy user's information needs. There exist various models for weighting terms of corpus documents and …
Few proposals exist in the literature where security in networks and communications is studied from a pro-active perspective. One of them is MARS, a self-healing system intended …
This paper proposes a static index pruning method for phrase queries based on term distance. It models the terms distance within document as a measure to find the term co …
Las líneas de defensa de seguridad tradicionales para proteger un sistema dado son prevención, detección y respuesta. A pesar de que sobre el papel dichos módulos deben …
Es innegable la importancia hoy en dıa de las redes de comunicación en multitud de las actividades diarias de la sociedad actual. Entre las distintas tecnologıas existentes, las …