Search Results - "Low, Richard M."
-
1
HTTP attack detection using n-gram analysis
Published in Computers & security (01-09-2014)“…Previous research has shown that byte-level analysis of network traffic can be useful for network intrusion detection and traffic analysis. Such an approach…”
Get full text
Journal Article -
2
New Diagonal Graph Ramsey Numbers of Unicyclic Graphs
Published in Theory and applications of graphs (Statesboro, Ga.) (2023)“…Grossman conjectured that R(G, G) = 2 · |V (G)| − 1, for all simple connected unicyclic graphs G of odd girth and |V (G)| ≥ 4. In this note, we prove his…”
Get full text
Journal Article -
3
The maximum rank of 2 × ⋯ × 2 tensors over 2
Published in Linear & multilinear algebra (17-02-2021)“…We determine that the maximum rank of an order-n tensor with format over the finite field is for even n, and for odd n. Since tensor rank is non-increasing…”
Get full text
Journal Article -
4
The integer-antimagic spectra of Hamiltonian graphs
Published in Electronic journal of graph theory and applications (01-01-2021)“…Let A be a nontrivial abelian group. A connected simple graph G = (V, E) is A -antimagic, if there exists an edge labeling f : E(G)→A ∖ {0A} such that…”
Get full text
Journal Article -
5
Entrepreneurial Chess
Published in International journal of game theory (01-05-2018)“…Although the combinatorial game Entrepreneurial Chess (or Echess ) was invented around 2005, this is our first publication devoted to it. A single Echess…”
Get full text
Journal Article -
6
Corrigendum to 'Rank classification of tensors over '
Published in Linear & multilinear algebra (04-03-2018)“…In this note, we correctly determine the orbits of the (maximum) rank nine tensors under the action of , the semi-direct product of (a direct product of)…”
Get full text
Journal Article -
7
Classic cryptanalysis using hidden Markov models
Published in Cryptologia (02-01-2017)“…In this article, the authors present a detailed introduction to hidden Markov models (HMM). They then apply HMMs to the problem of solving simple substitution…”
Get full text
Journal Article -
8
Orthogonal embeddings of graphs in Euclidean space
Published in Electronic journal of graph theory and applications (01-01-2019)“…Let G = (V, E) be a simple connected graph. An injective function f : V → Rn is called an n -dimensional (or n -D) orthogonal labeling of G if uv, uw ∈ E…”
Get full text
Journal Article -
9
Rank classification of tensors over
Published in Linear & multilinear algebra (01-11-2016)“…We consider tensors of format over the finite field . We use computer algebra to classify these tensors by their tensor rank, thus determining the maximum…”
Get full text
Journal Article -
10
On friendly index sets of k-galaxies
Published in Electronic journal of graph theory and applications (01-01-2019)“…Let G = (V, E) be a graph. A vertex labeling f : V → Z2 induces an edge labeling f * : E → Z2 defined by f * (xy) = f(x) + f(y) , for each edge xy ∈ E . For i…”
Get full text
Journal Article -
11
Cryptanalysis of Typex
Published in Cryptologia (03-04-2014)“…Rotor cipher machines played a large role in World War II: Germany used Enigma; America created Sigaba; Britain developed Typex. The breaking of Enigma by…”
Get full text
Journal Article -
12
Efficient Cryptanalysis of Homophonic Substitution Ciphers
Published in Cryptologia (03-07-2013)“…Substitution ciphers are among the earliest methods of encryption. Examples of classic substitution ciphers include the well-known simple substitution and the…”
Get full text
Journal Article -
13
Juice, Pulp and Seeds Fractionated from Dry Climate Primocane Raspberry Cultivars (Rubus idaeus) Have Significantly Different Antioxidant Capacity, Anthocyanin Content and Color
Published in Plant foods for human nutrition (Dordrecht) (01-12-2012)“…Raspberries contain flavonoid antioxidants whose relative concentrations may vary between the juice, pulp, and seed fractions. Oxygen radical absorbance…”
Get full text
Journal Article -
14
Notes on the combinatorial game: graph Nim
Published in Electronic journal of graph theory and applications (01-01-2016)“…The combinatorial game of Nim can be played on graphs. Over the years, various Nim-like games on graphs have been proposed and studied by N.J. Calkin et al.,…”
Get full text
Journal Article -
15
Integer-magic spectra of sun graphs
Published in Journal of combinatorial optimization (01-10-2007)Get full text
Conference Proceeding Journal Article -
16
Structural entropy and metamorphic malware
Published in Journal of computer virology and hacking techniques (01-11-2013)“…Metamorphic malware is capable of changing its internal structure without altering its functionality. A common signature is nonexistent in highly metamorphic…”
Get full text
Journal Article -
17
Simple substitution distance and metamorphic detection
Published in Journal of computer virology and hacking techniques (01-08-2013)“…To evade signature-based detection, metamorphic viruses transform their code before each new infection. Software similarity measures are a potentially useful…”
Get full text
Journal Article -
18
The integer-antimagic spectra of a disjoint union of Hamiltonian graphs
Published in Turkish journal of mathematics (01-01-2022)Get full text
Journal Article -
19
Application of the Combinatorial Nullstellensatz to Integer-magic Graph Labelings
Published in Theory and applications of graphs (Statesboro, Ga.) (01-02-2022)“…Let $A$ be a nontrivial abelian group and $A^* = A \setminus \{0\}$. A graph is $A$-magic if there exists an edge labeling $f$ using elements of $A^*$ which…”
Get full text
Journal Article -
20
Computation of new diagonal graph Ramsey numbers
Published in Electronic journal of graph theory and applications (01-01-2022)Get full text
Journal Article