![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Social Influence Study in Online Networks: A Three-Level Review
Social network analysis (SNA) views social relationships in terms of network theory consisting of nodes and ties. Nodes are the individual actors within the networks; ties are the relationships between the act...
-
Article
Practical secret sharing scheme realizing generalized adversary structure
Most existing secret sharing schemes are constructed to realize general access structure, which is defined in terms of authorized groups of participants, and is unable to be applied directly to the design of i...
-
Chapter and Conference Paper
Enhancing the Content of the Intrusion Alerts Using Logic Correlation
To solve the problem of the alert flooding and information semantics in the existing IDS, the approach using the logic correction to enhance the content of the alerts is presented. The Chronicle based on time ...
-
Chapter and Conference Paper
Availability Analysis and Comparison of Different Intrusion-Tolerant Systems
Based on the adopted redundancy techniques the intrusion-tolerant systems are classified into three kinds: resource redundancy based systems, complete information redundancy based systems, and partial informat...