


default search action
Computer Communications, Volume 49
Volume 49, August 2014
- Neminath Hubballi, Vinoth Suryanarayanan:
False alarm minimization techniques in signature-based intrusion detection systems: A survey. 1-17
- Jundong Chen
, Ankunda R. Kiremire, Matthias R. Brust
, Vir V. Phoha
:
Modeling online social network users' profile attribute disclosure behavior from a game theoretic perspective. 18-32 - Jehyun Lee, Heejo Lee:
GMAD: Graph-based Malware Activity Detection by DNS traffic analysis. 33-47 - Bin Li, Bing Qi, Yi Sun, Huaguang Yan, Songsong Chen:
Applications of forecasting based dynamic p-cycle reconfiguration under reliable optical network in smart grid. 48-59 - Ali Talari, Nazanin Rahnavard:
Robust LT codes with alternating feedback. 60-68

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.