publié le: September 2011
Phishing is a plague in cyberspace. Typically, phish detection methods either use human-verified URL blacklists or exploit Web page features via mach...
publié le: 2007
The problem of scattering of a Rayleigh wave by a chain of identical closely spaced monopole–dipole resonators with friction is considered. The values...
publié le: November 2011
Group-Centric Secure Information Sharing (g-SIS) envisions bringing users and objects together in a group to facilitate agile sharing of information...
Experimental studies of the energy balance of oil production stimulation by a low-intensity seismic field are carried out. It is shown that the change...