A distributed network Intrusion Detection System (IDS) called SA-NIDS is proposed based on the network-based intrusion detection architecture. It includes three basic components, Local Intrusion Detection Monitor (LIDM), Global Intrusion Detection Controller (GIDC), and Surveillance Agent (SA). Basically, the LIDM is used to do packets capturing, packets de-multiplexing, local intrusion ...Download Now
The data secrecy of outsourced files in cloud server should be protected even though cloud servers are untrustworthy. In this paper, the authors extensively analyze the techniques on data privacy protection for secure cloud storage. They propose and compare several general paradigms on data secrecy protection including ID-based scheme, CLPKC-based ...Download Now
The applications of wireless sensor networks are seriously constrained by energy supply. So how to prolong the network lifetime is an important and challenging issue, which is the focus of designing the WSNs routing protocol. The authors propose an approach of the wireless sensor network routing protocol based on ant ...Download Now
Submit Your Content
Get your content listed in our directory for free!
Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?