Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Seung Won Sohn"'
Publikováno v:
The KIPS Transactions:PartC. :727-738
Much research efforts are being exerted for the study of intrusion detection system(IDS). However little work has been for the communication medels and performance eveluation of the IDS. Here we present a communication framework for doing hybrid intr
Publikováno v:
ICOIN
We propose a decentralized combat model for the network-centric warfare. The troops (military units or weapon platforms) of Green (friendly) forces perform their own threat evaluation, decision making, and weapon allocation in order to encounter enem
Publikováno v:
Proceedings 3rd IEEE International Workshop on System-on-Chip for Real-Time Applications.
More and more devices including PCs, PDAs, mobile phones, and various kinds of appliances are being connected to the network and many people are trying to use them for network applications such as e-commerce. One of the most important requirements fo
Publikováno v:
Mobile Communications ISBN: 9783540007326
CDMA International Conference
CDMA International Conference
This paper proposes enhanced failover for Diameter-based AAA system. Diameter application layer watchdog algorithm enables failover from a server that has failed. SCTP heartbeat is used to perform failover between interfaces. This paper adopts both o
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1477cc2e69ef766c4a892b65fbebd923
https://doi.org/10.1007/3-540-36555-9_25
https://doi.org/10.1007/3-540-36555-9_25
Publikováno v:
ISIE 2001. 2001 IEEE International Symposium on Industrial Electronics Proceedings (Cat. No.01TH8570).
e-businesses have been spreading and many existing firms have been changing to take advantages of e-commerce model. However, most e-commerce site visitors are reluctant to shop online due to security concerns. Therefore trust and control of security
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783540417828
ICISC
ICISC
Security Evaluation System is a system that evaluates the security of the entire enterprise network domain consists of various components and that supports a security manager or a security management system in making decisions about security manageme
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f3b58ea5bd7c8adc1f84732d8b251364
https://doi.org/10.1007/3-540-45247-8_20
https://doi.org/10.1007/3-540-45247-8_20
Publikováno v:
Proceedings 3rd IEEE International Workshop on System-on-Chip for Real-Time Applications; 2002, p45-50, 6p
Publikováno v:
Journal of the Korean Orthopaedic Association. 9:326
Publikováno v:
10th International Conference on Telecommunications, 2003. ICT 2003; 2003, p597-597, 1p
Publikováno v:
ISIE 2001. 2001 IEEE International Symposium on Industrial Electronics Proceedings (Cat. No.01TH8570); 2001, p1373-1373, 1p