Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for ''
published presentations and documents on DocSlides.
Neighborhood Formation and Anomaly Detection in Bipartite G
by trish-goza
Jimeng. Sun, . Huiming. . Qu. , . Deepayan. . ...
On Detection and Concealment of Critical Roles in Tactical
by cheryl-pisano
Zhuo. Lu. University of Memphis. Cliff Wang. Arm...
On Detection and Concealment of Critical Roles in Tactical
by giovanna-bartolotta
Zhuo. Lu. University of Memphis. Cliff Wang. Arm...
Privacy-Preserving and Truthful Detection of Packet Droppin
by conchita-marotz
Abstract. Link error and malicious packet droppin...
On the Node Clone Detection
by kittie-lecroy
inWireless. Sensor Networks. Abstract. Wireless s...
Community Detection and Graph-based Clustering
by lois-ondreau
Adapted from Chapter 3. Of. Lei Tang and . Huan. ...
Community Detection and Evaluation
by test
Chapter 3. 1. Chapter 3, . Community Detection an...
Application 2: Misstatement detection
by natalia-silvester
Problem:. Given network and noisy domain knowled...
A Probabilistic Misbehavior Detection Scheme towards Efficient Trust Establishment in Delay-tolerant Networks
by cooper971
towards Efficient Trust Establishment in. Delay-to...
A Probabilistic Misbehavior Detection Scheme
by tawny-fly
towards Efficient Trust Establishment in. Delay-t...
Ralucca Gera, Naval Postgraduate School
by ellena-manuel
Monterey, California. rgera@nps.edu. Overview of....
On Survivability of Mobile Cyber Physical Systems
by min-jolicoeur
with Intrusion . Detection. 1. Presented by: Ting...
Xiaowei
by yoshiko-marsland
Ying, . Xintao. Wu. , Daniel Barbara...
MODELING AND ANALYSIS OF ATTACKS AND COUNTER DEFENSE MECHAN
by lois-ondreau
CYBER PHYSICAL SYSTEMS. -Robert Mitchell, Ing-Ray...
Looked at some research approaches to:
by briana-ranney
Evaluate . defense. effectiveness. Stop worm fro...
Compressing
by myesha-ticknor
Backoff. in CSMA Networks. Mahanth Gowda. Univer...
Query-based Graph Cuboid
by myesha-ticknor
Outlier Detection. Ayushi Dalmia. *. , Manish Gup...
2 Trusted Router and Protection Against Collaborative Attacks
by jainy
Characterizing collaborative/coordinated attacks. ...
Trusted Router and Collaborative Attacks
by payton
Bharat Bhargava. . . 2. Trusted Router and Pr...
Worms
by trish-goza
1. Viruses don’t break into your computer – t...
Detection of Promiscuous nodes Using Arp Packets
by debby-jeon
By Engin Arslan. Introduction. Threats in local n...
Socialbots and its implication On ONLINE SOCIAL Networks
by stefany-barnette
Md. Abdul . Alim. , Xiang Li and . Tianyi. Pan....
191187
by faustina-dinatale
-. Himali. . Jani. -Cong Cheng. -....
Layer two and below
by alida-meadow
1. Rocky K. C. Chang 13 September 201...
Speakers:
by test
Yanyan . Ni, . Yeze. Li. Outline. Introduction. ...
Grade Projections
by stefany-barnette
I’ve calculated two grades for everyone:. Reali...
Mode shifting between storage and recall based on novelty d
by mitsue-stanley
hippocampal. circuits. M. . Meeter. J. M. J. . M...
CSE 486/586 Distributed Systems
by tatyana-admore
Gossiping. Steve Ko. Computer Sciences and Engine...
Node Similarity, Graph Similarity and Matching:
by briana-ranney
Theory and Applications. Danai Koutra (CMU). Tina...
Wireless Sensor Network Security:
by phoebe-click
A Survey. Presented By: . Anubhav Mathur. Departm...
Discovering Community Structure
by lois-ondreau
by Optimizing Community Quality Metrics. Mingming...
Query-based Graph Cuboid
by kittie-lecroy
Outlier Detection. Ayushi Dalmia. *. , Manish Gup...
1 EE
by lois-ondreau
122:. Link Layer. Ion Stoica. TAs: . Junda. Liu...
FIND: Faulty Node Detection for Wireless Sensor Networks
by pasty-toler
Shuo Guo. , Ziguo Zhong and Tian He. University o...
An Iterative Algorithm
by jane-oiler
for Trust Management. and Adversary Detection. fo...
Knowing Your Enemy
by sherrill-nordquist
Understanding and Detecting. Malicious Web Advert...
Detection of Colluding Misbehaving Nodes in Mobile Ad
by natalia-silvester
Mogre Matthias Hollick and Ralf Steinmetz Email g...
Cork: Dynamic Memory Leak Detection with Garbage Collection
by min-jolicoeur
Maria Jump. Kathryn S. McKinley. {mjump,mckinley}...
Hardware implementation and Demonstration
by cheryl-pisano
Synapse . RF26X. We started off . with Synapse . ...
INST 4200 David J Stucki
by test
Spring 2017. An Overview of . Connectionism. Neur...
Load More...