Articles with "detection process" as a keyword



Photo from wikipedia

Secret key rate of a continuous-variable quantum-key-distribution scheme when the detection process is inaccessible to eavesdroppers

Sign Up to like & get
recommendations!
Published in 2018 at "Physical Review A"

DOI: 10.1103/physreva.98.042319

Abstract: We have developed a method to calculate a secret key rate of a continuous-variable quantum-key-distribution scheme using four coherent states and postselection for a general model of Gaussian attacks. We assume that the transmission line… read more here.

Keywords: detection process; key rate; detection; scheme ... See more keywords
Photo by firmbee from unsplash

Burstiness of Intrusion Detection Process: Empirical Evidence and a Modeling Approach

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2017.2705629

Abstract: We analyze sets of intrusion detection records observed on the networks of several large, nonresidential organizations protected by a form of intrusion detection and prevention service. Our analyses reveal that the process of intrusion detection… read more here.

Keywords: detection process; intrusion detection; detection; burstiness intrusion ... See more keywords