Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Philip Nobles"'
Autor:
Shakhirul Mat Salleh, Muzammil Jusoh, Abdul Hafiizh Ismail, Muhammad Ramlee Kamarudin, Philip Nobles, Mohamad Kamal A. Rahim, Thennarasan Sabapathy, Mohamed Nasrun Osman, Mohd Ilman Jais, Ping Jack Soh
Publikováno v:
IEEE Access, Vol 6, Pp 7350-7358 (2018)
This paper proposes the design of a reconfigurable circularly polarized textile antenna. The circular polarization feature in the proposed antenna is generated by the edge truncation of a rectangular patch and the incorporation of a slotted ground pl
Externí odkaz:
https://doaj.org/article/f167acdb851c4ff495d2b87dd414f6de
Autor:
Mohamad Kamal A. Rahim, M. I. Jais, Muzammil Jusoh, Philip Nobles, Ping Jack Soh, Muhammad Ramlee Kamarudin, Thennarasan Sabapathy, A. H. Ismail, Mohamed Nasrun Osman, Shakhirul Mat Salleh
Publikováno v:
IEEE Access, Vol 6, Pp 7350-7358 (2018)
This paper proposes the design of a reconfigurable circularly polarized textile antenna. The circular polarization feature in the proposed antenna is generated by the edge-truncation of a rectangular patch and the incorporation of a slotted ground pl
Publikováno v:
Information Systems Frontiers. 15:17-34
Insider attacks are often subtle and slow, or preceded by behavioral indicators such as organizational rule-breaking which provide the potential for early warning of malicious intent; both these cases pose the problem of identifying attacks from limi
Publikováno v:
Network Security. 2008:11-15
In an earlier article we examined reconnaissance activity over networks and discussed some of the challenges in detecting such behaviour.^1 One approach to dealing with such activity is false positive response.^2 The purpose of false positive respons
Publikováno v:
Network Security. 2008:12-16
Along with its wider reach in society, in the form of both mobility and relatively affordable access, the internet has transformed the world we live in, serving as bedrock for electronic commerce and other digital and communication services. It has b
Publikováno v:
Network Security. 2008:8-11
Last month, part one of this article emphasised the need for examining various features of intrusion detection sensors. It provided a broad definition of a sensor, as a device that is callable of signalling a suspicious event, and characterised senso
Publikováno v:
Network Security. 2008:10-12
An intrusion detection sensor is defined as a device that collects and analyses network traffic for the purpose of identifying suspicious events. Too often the value of a sensor is associated with its data collection and analysis features. Experience
Publikováno v:
ARES
In large network environments multiple intrusion detection sensors are needed to adequately monitor network traffic. However, deploying and managing additional sensors on a large network can be a demanding task, and organizations have to balance thei
Publikováno v:
Advances in Intelligent and Soft Computing ISBN: 9783642040900
CISIS
CISIS
This paper investigates how intrusion detection system (IDS) sensors should best be placed on a network when there are several competing evaluation criteria. This is a computationally difficult problem and we show how Multi-Objective Genetic Algorith
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f1e85b788fdd63abb3d6dc282cfb5c3d
https://doi.org/10.1007/978-3-642-04091-7_13
https://doi.org/10.1007/978-3-642-04091-7_13
Publikováno v:
Advances in Information Security and Assurance ISBN: 9783642026164
ISA
ISA
The value of an intrusion detection sensor is often associated with its data collection and analysis features. Experience tells us such sensors fall under a range of different types and are diverse in their operational characteristics. There is a nee
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5bb1ac8a3f8bbdf100fffacd46c89639
https://doi.org/10.1007/978-3-642-02617-1_26
https://doi.org/10.1007/978-3-642-02617-1_26