Sign Up to like & get
recommendations!
0
Published in 2018 at "Physical Review A"
DOI: 10.1103/physreva.98.042319
Abstract: We have developed a method to calculate a secret key rate of a continuous-variable quantum-key-distribution scheme using four coherent states and postselection for a general model of Gaussian attacks. We assume that the transmission line…
read more here.
Keywords:
detection process;
key rate;
detection;
scheme ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2017.2705629
Abstract: We analyze sets of intrusion detection records observed on the networks of several large, nonresidential organizations protected by a form of intrusion detection and prevention service. Our analyses reveal that the process of intrusion detection…
read more here.
Keywords:
detection process;
intrusion detection;
detection;
burstiness intrusion ... See more keywords