researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2002
2009
Filter by Tag
[+]
OR
AND
NOT
1
C++
Meta-Environment
access control
analysis
architecture
data-flow
deployment
design
e-science
mobile
ontologies
ontology
optimization
peer-to-peer
protocol
rule-based
rules
security
source-to-source
systematic-approach
Filter by Author
[+]
OR
AND
NOT
1
A. B. M. Shawkat Ali
A. John Prakash
Aarthi Nagarajan
Aasem N. Alyahya
Andrew Chiou
Jiankun Hu
Jianwen Liu
Kevin S. Tickle
Kit Yan Chan
Roland Dodd
Ross Broadfoot
S. H. Ling
Sami Harari
Spyros Antonatos
Vallipuram Muthukkumarasamy
Wanlei Zhou
William Guo
Xinghuo Yu
Yang Zhang
Yi Mu
Filter by Top terms
[+]
OR
AND
NOT
1
ad
analysis
data
detection
distributed
efficient
hoc
mobile
model
network
networks
novel
protocol
scheme
secure
security
self
signature
system
using
Mobile Datenbanken und Informationssysteme (mdi)
Editions
Publications
Viewing Publication 1 - 99 from 99
2009
Enhancing RFID Tag Resistance against Cloning Attack
Jemal Abawajy
.
mdi 2009
:
18-23
[doi]
An Efficient Mobile Voting System Security Scheme Based on Elliptic Curve Cryptography
Tohari Ahmad
,
Jiankun Hu
,
Song Han
.
mdi 2009
:
474-479
[doi]
Exploit Kashida Adding to Arabic e-Text for High Capacity Steganography
Ahmed Al-Nazer
,
Adnan Abdul-Aziz Gutub
.
mdi 2009
:
447-451
[doi]
A Context-Aware Access Control Model for Pervasive Environments
Sumayah Al-Rwais
,
Jalal Al-Muhtadi
.
mdi 2009
:
425-430
[doi]
An Evaluation of Secure Real-Time Transport Protocol (SRTP) Performance for VoIP
Andre L. Alexander
,
Alexander L. Wijesinha
,
Ramesh K. Karne
.
mdi 2009
:
95-101
[doi]
Intrusion Detection System Using Self-Organizing Maps
Mansour M. Alsulaiman
,
Aasem N. Alyahya
,
Raed A. Alkharboush
,
Nasser S. Alghafis
.
mdi 2009
:
397-402
[doi]
Harnessing the Power of P2P Systems for Fast Attack Signature Validation
Spyros Antonatos
,
Quang Hieu Vu
.
mdi 2009
:
107-114
[doi]
A New Similarity Measure for the Anomaly Intrusion Detection
Ahmed Belkhirat
,
Abdelghani Bouras
,
Abdelkader Belkhir
.
mdi 2009
:
431-436
[doi]
Trusted Network Access Control in the Eduroam Federation
Fernando Bernal-Hidalgo
,
Manuel Sánchez
,
Gabriel López
,
Antonio F. Gómez-Skarmeta
,
Óscar Cánovas Reverte
.
mdi 2009
:
170-175
[doi]
Distributed Detection of Attacks in Mobile Ad Hoc Networks Using Learning Vector Quantization
James Cannady
.
mdi 2009
:
571-574
[doi]
Speech Recognition Enhancement Using Beamforming and a Genetic Algorithm
Kit Yan Chan
,
Siow Yong Low
,
Sven Nordholm
,
Ka Fai Cedric Yiu
,
S. H. Ling
.
mdi 2009
:
510-515
[doi]
Architecture Design of High Efficient and Non-memory AES Crypto Core for WPAN
Rong-Jian Chen
,
Yu-Cheng Peng
,
Jui-Lin Lai
,
Shi-Jinn Horng
.
mdi 2009
:
36-43
[doi]
A Novel Fuzzy Identity-Based Signature with Dynamic Threshold
Wei Chen
,
Li Zhu
,
Xiaomei Cao
,
Yang Geng
.
mdi 2009
:
192-198
[doi]
Integrating Palmprint and Fingerprint for Identity Verification
Yong Jian Chin
,
Thian Song Ong
,
Michael K. O. Goh
,
Bee Yan Hiew
.
mdi 2009
:
437-442
[doi]
HoneyLab: Large-Scale Honeypot Deployment and Resource Sharing
W. Y. Chin
,
Evangelos P. Markatos
,
Spyros Antonatos
,
Sotiris Ioannidis
.
mdi 2009
:
381-388
[doi]
Hardware Trojan Horse Device Based on Unintended USB Channels
John Clark
,
Sylvain Leblanc
,
Scott Knight
.
mdi 2009
:
1-8
[doi]
Real-Time Data Mining Methodology and a Supporting Framework
Xiong Deng
,
Moustafa Ghanem
,
Yike Guo
.
mdi 2009
:
522-527
[doi]
Functional Characteristics and Proposed Deployment Infrastructure of an Industrial Decision Support System within a Sugar Mill Crystallisation Stage
Roland Dodd
,
Andrew Chiou
,
Xinghuo Yu
,
Ross Broadfoot
.
mdi 2009
:
495-500
[doi]
Industrial Process Model Integration Using a Blackboard Model within a Pan Stage Decision Support System
Roland Dodd
,
Andrew Chiou
,
Xinghuo Yu
,
Ross Broadfoot
.
mdi 2009
:
489-494
[doi]
Framework for Identification of Power System Operating Security Regions
Mohamed A. El-Kady
,
Essam A. Al-Ammar
.
mdi 2009
:
415-419
[doi]
Novel Approaches for Detecting Frauds in Energy Consumption
Fábio Fabris
,
Leticia Rosetti Margoto
,
Flávio Miguel Varejão
.
mdi 2009
:
546-551
[doi]
Grid of Security: A New Approach of the Network Security
Olivier Flauzac
,
Florent Nolot
,
Cyril Rabat
,
Luiz Angelo Steffenel
.
mdi 2009
:
67-72
[doi]
A Hierarchical Model for Cross-Domain Communication of Health Care Units
Dimitris Geneiatakis
,
Costas Lambrinoudakis
,
Stefanos Gritzalis
.
mdi 2009
:
123-129
[doi]
An Efficient Certificateless Encryption Scheme in the Standard Model
Hua Guo
,
Xiyong Zhang
,
Yi Mu
,
Zhoujun Li
.
mdi 2009
:
302-309
[doi]
Weakness on Cryptographic Schemes Based on Chained Codes
Omessaad Hamdi
,
Ammar Bouallegue
,
Sami Harari
.
mdi 2009
:
579-581
[doi]
FSS2-Id/A Fast Safe Identity-Based Multi Signature Scheme
Sami Harari
.
mdi 2009
:
316-320
[doi]
State-Based Usage Control Enforcement with Data Flow Tracking using System Call Interposition
Matús Harvan
,
Alexander Pretschner
.
mdi 2009
:
373-380
[doi]
DeWorm: A Simple Protocol to Detect Wormhole Attacks in Wireless Ad Hoc Networks
Thaier Hayajneh
,
Prashant Krishnamurthy
,
David Tipper
.
mdi 2009
:
73-80
[doi]
A Cryptographically t-Private Auction System
Markus Hinkelmann
,
Andreas Jakoby
,
Nina Moebius
,
Tiark Rompf
,
Peer Stechert
.
mdi 2009
:
44-51
[doi]
On Role Mappings for RBAC-Based Secure Interoperation
Jinwei Hu
,
Ruixuan Li
,
Zhengding Lu
.
mdi 2009
:
270-277
[doi]
ACSIS: Agents for Cooperative Secured Information Systems
L. Huin
,
Danielle Boulanger
,
Eric Disson
.
mdi 2009
:
176-183
[doi]
Incentive-Based Self-Organized Public Key Management for Mobile Ad Hoc Networks
Dakila Reyes II
,
Cedric Angelo M. Festin
,
Susan Pancho-Festin
.
mdi 2009
:
565-570
[doi]
Generating Hierarchical Association Rules with the Use of Bayesian Network
Khalid Iqbal
,
Sohail Asghar
.
mdi 2009
:
528-533
[doi]
Contextual Analysis Methods Capturing Knowledge Representation Related to the Reputation
Miho Itoh
.
mdi 2009
:
552-559
[doi]
Determining Supply Chain Flexibility Using Statistics and Nueral Networks: A Comparative Study
Ananda Jeeva
,
William Guo
.
mdi 2009
:
506-509
[doi]
Enhancing the Security of a More Efficient & Secure Dynamic ID-Based Remote User Authentication Scheme
Muhammad Khurram Khan
.
mdi 2009
:
420-424
[doi]
Changing Network Behavior
Robert Koch
.
mdi 2009
:
60-66
[doi]
Securing Roaming and Vertical Handover in Fourth Generation Networks
Neila Krichene
,
Noureddine Boudriga
.
mdi 2009
:
225-231
[doi]
Distributed Agent Architecture for Intrusion Detection Based on New Metrics
Farah Barika Ktata
,
Nabil El-Kadhi
,
Khaled Ghédira
.
mdi 2009
:
321-327
[doi]
Significance of Computional Intelligence Method in Computer Networks
Reginald Lal
,
Andrew Chiou
.
mdi 2009
:
468-473
[doi]
A Security Calculus of Concurrent Objects for Verifying Ad Hoc Network Protocols
Qin Li
,
Qingkai Zeng
.
mdi 2009
:
232-239
[doi]
A Modified PSO Algorithm for Constrained Multi-objective Optimization
Lily D. Li
,
Xinghuo Yu
,
Xiaodong Li
,
William Guo
.
mdi 2009
:
462-467
[doi]
Distinguishing DDoS Attacks from Flash Crowds Using Probability Metrics
Ke Li
,
Wanlei Zhou
,
Ping Li
,
Jing Hai
,
Jianwen Liu
.
mdi 2009
:
9-17
[doi]
Authentication in Peer-to-Peer Network: Survey and Research Directions
Zhongwen Li
,
Xiaochen Xu
,
Liang Shi
,
Jian Liu
,
Chen Liang
.
mdi 2009
:
115-122
[doi]
An Extension of Differential Fault Analysis on AES
Wei Li
,
Dawu Gu
,
Yong Wang
,
Juanru Li
,
Zhiqiang Liu
.
mdi 2009
:
443-446
[doi]
A New Particle Swarm Optimization Algorithm for Neural Network Optimization
S. H. Ling
,
Hung T. Nguyen
,
Kit Yan Chan
.
mdi 2009
:
516-521
[doi]
A Novel Reputation Computation Model Based on Subjective Logic for Mobile Ad Hoc Networks
Yining Liu
,
Keqiu Li
,
Yong Zhang
,
Wenyu Qu
.
mdi 2009
:
294-301
[doi]
A System for Distributed SELinux Policy Management
Pedro Chavez Lugo
,
Juan Manuel Garcia Garcia
,
Juan J. Flores
.
mdi 2009
:
254-261
[doi]
A Data Mining Approach for Detection of Self-Propagating Worms
Mohd Fadzli Marhusin
,
Chris Lokan
,
Henry Larkin
,
David Cornforth
.
mdi 2009
:
24-29
[doi]
An Approach to Leak Detection in Pipe Networks Using Analysis of Monitored Pressure Values by Support Vector Machine
John Mashford
,
Dhammika De Silva
,
Donavan Marney
,
Stewart Burn
.
mdi 2009
:
534-539
[doi]
A Comparison Between Rule Based and Association Rule Mining Algorithms
Mohammed Md. Mazid
,
A. B. M. Shawkat Ali
,
Kevin S. Tickle
.
mdi 2009
:
452-455
[doi]
Speaker Verification Based on Different Vector Quantization Techniques with Gaussian Mixture Models
Sheeraz Memon
,
Margaret Lech
,
Namunu Chinthaka Maddage
.
mdi 2009
:
403-408
[doi]
Error Correction of Noisy Block Cipher Using Cipher and Plaintext Characteristics
Nabil M. K. Mirza
,
Ziad Osman
,
Rached N. Zantout
,
Mohamed El-Sayed
.
mdi 2009
:
151-157
[doi]
Policy-Driven Patch Management for Distributed Environments
Jan Muhammad
,
Richard O. Sinnott
.
mdi 2009
:
158-163
[doi]
Property Based Attestation and Trusted Computing: Analysis and Challenges
Aarthi Nagarajan
,
Vijay Varadharajan
,
Michael Hitchens
,
Eimear Gallery
.
mdi 2009
:
278-285
[doi]
Early Breast Cancer Identification: Which Way to Go? Microarray or Image Based Computer Aided Diagnosis!
Jesmin Nahar
,
Kevin S. Tickle
,
A. B. M. Shawkat Ali
,
Yi-Ping Phoebe Chen
.
mdi 2009
:
456-461
[doi]
F-TAD: Traffic Anomaly Detection for Sub-networks Using Fisher Linear Discriminant
Hyunhee Park
,
Meejoung Kim
,
Chul-Hee Kang
.
mdi 2009
:
328-335
[doi]
A Novel Quad-band Internal Antenna with Ni/Ag/Ni Structure for Wireless Mobile Handset
Book-Sung Park
,
Dan Qi
,
Yanli Liu
,
Bolormaa Khurelbaatar
,
Chul-Ju Kim
.
mdi 2009
:
575-578
[doi]
Putting Simple Hierarchy into Ant Foraging: Cluster-Based Soft-Bots
Wei Peng
,
Qingmai Wang
,
Bin Wang
,
Xinghuo Yu
.
mdi 2009
:
484-488
[doi]
Honeypot Traces Forensics: The Observation Viewpoint Matters
Van-Hau Pham
,
Marc Dacier
.
mdi 2009
:
365-372
[doi]
Analysis of Two Pairing-Based Three-Party Password Authenticated Key Exchange Protocols
Raphael C.-W. Phan
,
Wei-Chuen Yau
,
Bok-Min Goi
.
mdi 2009
:
102-106
[doi]
Secure Authenticated Key Establishment Protocol for Ad Hoc Networks
A. John Prakash
,
V. Rhymend Uthariaraj
.
mdi 2009
:
87-94
[doi]
If Cross-Functional Teams are the Answer, What is the Question?
W. K. Daniel Pun
,
Ricardo Santa
.
mdi 2009
:
501-505
[doi]
Building a SCADA Security Testbed
Carlos Queiroz
,
Abdun Naser Mahmood
,
Jiankun Hu
,
Zahir Tari
,
Xinghuo Yu
.
mdi 2009
:
357-364
[doi]
A Messaging-Based System for Remote Server Administration
Marco Ramilli
,
Marco Prandini
.
mdi 2009
:
262-269
[doi]
Discovery of Exceptions: A Step towards Perfection
Saroj Ratnoo
,
K. K. Bharadwaj
.
mdi 2009
:
540-545
[doi]
xDUCON: Coordinating Usage Control Policies in Distributed Domains
Giovanni Russello
,
Naranker Dulay
.
mdi 2009
:
246-253
[doi]
MagicNET: Security System for Development, Validation and Adoption of Mobile Agents
Muhammad Awais Shibli
,
Sead Muftic
,
Alessandro Giambruno
,
Antonio Lioy
.
mdi 2009
:
389-396
[doi]
Implementation and Analysis of Sensor Security Protocols in a Home Health Care System
Kalvinder Singh
,
Vallipuram Muthukkumarasamy
.
mdi 2009
:
137-142
[doi]
Scalable RFID Pseudonym Protocol
Boyeon Song
,
Chris J. Mitchell
.
mdi 2009
:
216-224
[doi]
Enhancing Trust on e-Government: A Decision Fusion Module
Bruno Lage Srur
,
Vallipuram Muthukkumarasamy
.
mdi 2009
:
164-169
[doi]
Flexible Wireless Trust Through Ontology-Based Mapping and Its Attendant Semantic Limitations
Robert Steele
,
Kyongho Min
.
mdi 2009
:
240-245
[doi]
A Multi-agent Security Architecture
Rossilawati Sulaiman
,
Dharmendra Sharma
,
Wanli Ma
,
Dat Tran
.
mdi 2009
:
184-191
[doi]
Extended K-Anonymity Models Against Attribute Disclosure
Xiaoxun Sun
,
Hua Wang
,
Lili Sun
.
mdi 2009
:
130-136
[doi]
Self-Protection Model Based on Intelligent Agent
Bing Sun
,
Ya-Ping Zhang
,
Ning Zhang
.
mdi 2009
:
199-202
[doi]
An Information Filtering Approach
Nasim Vatani
,
Amir Masoud Rahmani
,
Mohammad Ebrahim Shiri
.
mdi 2009
:
30-35
[doi]
Characterising the Evolution in Scanning Activity of Suspicious Hosts
Alif Wahid
,
Christopher Leckie
,
Chenfeng Vincent Zhou
.
mdi 2009
:
344-350
[doi]
A Self-Reflection Model for Autonomic Computing Systems Based on p-Calculus
Huiqiang Wang
,
Hongwu Lv
,
Guangsheng Feng
.
mdi 2009
:
310-315
[doi]
Design of a Secure Router System for Next-Generation Networks
Tilman Wolf
,
Russell Tessier
.
mdi 2009
:
52-59
[doi]
Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009
Yang Xiang
,
Javier Lopez
,
Haining Wang
,
Wanlei Zhou
, editors,
IEEE Computer Society,
2009.
Automatic Network Protocol Automaton Extraction
Ming-ming Xiao
,
Shun-Zheng Yu
,
Yu Wang
.
mdi 2009
:
336-343
[doi]
Certificateless Threshold Signature for Data Report Authentication in Mobile Ad Hoc Network
Piyi Yang
,
Zhenfu Cao
,
Xiaolei Dong
.
mdi 2009
:
143-150
[doi]
Practical Implementations for Securing VoIP Enabled Mobile Devices
Chan Yeob Yeun
,
Salman Mohammed Al-Marzouqi
.
mdi 2009
:
409-414
[doi]
Discriminating DDoS Flows from Flash Crowds Using Information Distance
Shui Yu
,
Theerasak Thapngam
,
Jianwen Liu
,
Su Wei
,
Wanlei Zhou
.
mdi 2009
:
351-356
[doi]
Guided Navigation Using Query Log Mining through Query Expansion
Burcu Yurekli
,
Gokhan Capan
,
Baris Yilmazel
,
Ozgur Yilmazel
.
mdi 2009
:
560-564
[doi]
A Novel Grid Trust Model Based on Fuzzy Theory
Shaomin Zhang
,
Yue Zou
,
Baoyi Wang
.
mdi 2009
:
203-207
[doi]
A Pseudonym-Based Signature Scheme for Dynamic Clusters in Ad Hoc Networks
Yang Zhang
.
mdi 2009
:
208-215
[doi]
Effective Attacks in the Tor Authentication Protocol
Yang Zhang
.
mdi 2009
:
81-86
[doi]
Secure Mobile Agents with Designated Hosts
Qi Zhang
,
Yi Mu
,
Minjie Zhang
,
Robert Huijie Deng
.
mdi 2009
:
286-293
[doi]
2002
XML-basiertes Content-Management mit OLAP-Funktionalität in einem wireless-orientierten Anwendungskontext
Stefan Audersch
.
mdi 2002
:
15-19
[doi]
Tagungsband Workshop Mobile Datenbanken und Informationssysteme - Datenbanktechnologie überall und jederzeit, Arbeitskreis Mobile Datenbanken und Informationssysteme im GI-Fachausschuss 2.5, Magdeburg, 21.-22. März 2002
Hagen Höpfner
,
Gunter Saake
, editors,
Otto-von-Guericke-Universität Magdeburg,
2002.
An Ontology-Based Document-Space as an Adaptable User Interface for Mobile Information Systems
Michael Klein
,
Birgitta König-Ries
.
mdi 2002
:
10-14
[doi]
Konzeption eines Anfragesystems für leichtgewichtige, erweiterbare DBMS
Thomas Leich
,
Hagen Höpfner
.
mdi 2002
:
33-37
[doi]
Dokument- und Kontaktsynchronisation mit mobilen Datenbanken: Anforderungen und Lösungsansätze aus Sicht von Unternehmensportalen (DRAFT)
Florian Matthes
,
Vanda Lehel
.
mdi 2002
:
3-9
[doi]
CoPark - ein mobiler datenbankbasierter Dienst und ein neuartiges Konzept zur Parkraumbewirtschaftung in Ballungszentren
Dietmar Scharf
,
Rudolf Bayer
.
mdi 2002
:
51-55
[doi]
Realisierung eines mobilen Geodatenservers für PDAs auf der Basis von Standards des OpenGIS-Consortiums
Stefan Schmitz
,
Alexander Zipf
,
Hidir Aras
.
mdi 2002
:
23-27
[doi]
Efficient Client Caching and Prefetching in Data Broadcast Environments
André Seifert
.
mdi 2002
:
46-50
[doi]
Protokolle für mobile Netze - Eine Übersicht im Hinblick auf transaktionsorientierte Anwendungen
Erich Stein
.
mdi 2002
:
41-45
[doi]
Mobile Computing - Die ORACLE Strategie
Barbara Steinhanses
.
mdi 2002
:
28-32
Sign in
or
sign up
to see more results.