![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
An Efficient Algorithm for Fingercode-Based Biometric Identification
With the emerging trend of incorporating biometrics information in e-financial and e-government systems arisen from international efforts in anti-money laundering and counter-terrorism, biometric identificatio...
-
Chapter and Conference Paper
An Efficient Anomaly Detection Algorithm for Vector-Based Intrusion Detection Systems
This paper proposes a new algorithm that improves the efficiency of the anomaly detection stage of a vector-based intrusion detection scheme. In general, intrusion detection schemes are based on the hypothesis...
-
Chapter and Conference Paper
Application of Content Computing in Honeyfarm
Currently there are a wide range of techniques dedicated to network security among which honeyfarm is one of the newest development. Honeyfarm provides replication of web sites aiming to redirect hackers from ...
-
Chapter and Conference Paper
Anomaly Detection in Grid Computing Based on Vector Quantization
An efficient and effective intrusion detection model based the Vector Quantization (VQ) technique is proposed. This model is suitable for security monitoring in the grid computing environment. Experimental res...
-
Chapter and Conference Paper
Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes
With the rapid development of the global information infrastructure, the use of virtual organization (VO) is gaining increasing importance as a model for studying business and organizational structures. The no...
-
Chapter and Conference Paper
Enhancing the Scalability of the Community Authorization Service for Virtual Organizations
Grid computing has emerged as a special form of distributed computing and is distinguished from conventional distributed computing by its focus on dynamic, large-scale resource sharing over a wide geographic d...
-
Chapter and Conference Paper
Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems
With the rapid development of the global information infrastructure, the use of virtual organization (VO) is gaining increasing importance as a model for building large-scale business information systems. The ...
-
Chapter and Conference Paper
Real-Time Emulation of Intrusion Victim in HoneyFarm
Security becomes increasingly important. However, existing security tools, almost all defensive, have many vulnerabilities which are hard to overcome because of the lack of information about hackers techniques...
-
Article
Adaptive tree similarity learning for image retrieval
Learning-enhanced relevance feedback is one of the most promising and active research directions in content-based image retrieval in recent years. However, the existing approaches either require prior knowledg...
-
Chapter and Conference Paper
Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services
This paper presents an efficient implementation technique for presenting multivariate audit data needed by statistical-based intrusion detection systems. Multivariate data analysis is an important tool in stat...