Search results
-
-
Title
-
BIO-INSPIRED CYBER SECURITY AND THREAT ANALYTICS
-
Author
-
Rauf, Usman
-
Date Created
-
2020
-
Subjects--Topical
-
Computer science, Information science
-
Description
-
After decades of deploying cyber-security systems, it is a well-known fact that theexisting cyber infrastructure has numerous inherent limitations that not only makethe maintenance of the current network security devices difficult but also provide...
-
-
Title
-
Development of a multi-layered botmaster based analysis framework
-
Author
-
Paxton, Napoleon
-
Date Created
-
2011
-
Subjects--Topical
-
Computer science, Information technology
-
Description
-
Botnets are networks of compromised machines called bots that come together to form the tool of choice for hackers in the exploitation and destruction of computer networks. Most malicious botnets have the ability to be rented out to a broad range ...
-
-
Title
-
Optimal purchasing strategy for bandwidth: A buyer's perspective
-
Author
-
Vergara, Frances
-
Date Created
-
2009
-
Subjects--Topical
-
Computer science, Business
-
Description
-
In today's burgeoning business environments, data frenetically pulses through massive interconnected networks as firms create, compile, and disseminate vast amounts of information. Organizations need to acquire the bandwidth that allows them to ef...
-
-
Title
-
THE DESIGN AND IMPLEMENTATION OF FUZZY QUERY PROCESSING ON SENSOR NETWORKS
-
Author
-
Doman, Marguerite
-
Date Created
-
2009
-
Subjects--Topical
-
Computer science
-
Description
-
Sensor nodes and Wireless Sensor Networks (WSN) enable observation of the physical world in unprecedented levels of granularity. A growing number of environmental monitoring applications are being designed to leverage data collection features of W...