Search Results - "Low, Richard M."

Refine Results
  1. 1

    HTTP attack detection using n-gram analysis by Oza, Aditya, Ross, Kevin, Low, Richard M., Stamp, Mark

    Published in Computers & security (01-09-2014)
    “…Previous research has shown that byte-level analysis of network traffic can be useful for network intrusion detection and traffic analysis. Such an approach…”
    Get full text
    Journal Article
  2. 2

    New Diagonal Graph Ramsey Numbers of Unicyclic Graphs by Low, Richard, Kapbasov, Ardak

    “…Grossman conjectured that R(G, G) = 2 · |V (G)| − 1, for all simple connected unicyclic graphs G of odd girth and |V (G)| ≥ 4. In this note, we prove his…”
    Get full text
    Journal Article
  3. 3

    The maximum rank of 2 × ⋯ × 2 tensors over 2 by Stavrou, Stavros Georgios, Low, Richard M.

    Published in Linear & multilinear algebra (17-02-2021)
    “…We determine that the maximum rank of an order-n tensor with format over the finite field is for even n, and for odd n. Since tensor rank is non-increasing…”
    Get full text
    Journal Article
  4. 4

    The integer-antimagic spectra of Hamiltonian graphs by Odabasi, Ugur, Roberts, Dan, Low, Richard M.

    “…Let  A  be a nontrivial abelian group. A connected simple graph  G = (V, E)  is  A -antimagic, if there exists an edge labeling  f : E(G)→A ∖ {0A}  such that…”
    Get full text
    Journal Article
  5. 5

    Entrepreneurial Chess by Berlekamp, Elwyn, Low, Richard M.

    Published in International journal of game theory (01-05-2018)
    “…Although the combinatorial game Entrepreneurial Chess (or Echess ) was invented around 2005, this is our first publication devoted to it. A single Echess…”
    Get full text
    Journal Article
  6. 6

    Corrigendum to 'Rank classification of tensors over ' by Stavrou, Stavros G., Low, Richard M., Hernandez, Nicholas J.

    Published in Linear & multilinear algebra (04-03-2018)
    “…In this note, we correctly determine the orbits of the (maximum) rank nine tensors under the action of , the semi-direct product of (a direct product of)…”
    Get full text
    Journal Article
  7. 7

    Classic cryptanalysis using hidden Markov models by Vobbilisetty, Rohit, Di Troia, Fabio, Low, Richard M., Visaggio, Corrado Aaron, Stamp, Mark

    Published in Cryptologia (02-01-2017)
    “…In this article, the authors present a detailed introduction to hidden Markov models (HMM). They then apply HMMs to the problem of solving simple substitution…”
    Get full text
    Journal Article
  8. 8

    Orthogonal embeddings of graphs in Euclidean space by Shiu, Wai Chee, Low, Richard M.

    “…Let G = (V, E) be a simple connected graph. An injective function f : V → Rn is called an n -dimensional (or n -D) orthogonal labeling of G if uv, uw ∈ E…”
    Get full text
    Journal Article
  9. 9

    Rank classification of tensors over by Stavrou, Stavros G., Low, Richard M., Hernandez, Nicholas J.

    Published in Linear & multilinear algebra (01-11-2016)
    “…We consider tensors of format over the finite field . We use computer algebra to classify these tensors by their tensor rank, thus determining the maximum…”
    Get full text
    Journal Article
  10. 10

    On friendly index sets of k-galaxies by Lee, S-M, Low, Richard M., Ng, H.K., Wang, Y-C

    “…Let G = (V, E) be a graph. A vertex labeling f : V → Z2 induces an edge labeling f *  : E → Z2 defined by f * (xy) = f(x) + f(y) , for each edge xy ∈ E . For i…”
    Get full text
    Journal Article
  11. 11

    Cryptanalysis of Typex by Chang, Kelly, Low, Richard M., Stamp, Mark

    Published in Cryptologia (03-04-2014)
    “…Rotor cipher machines played a large role in World War II: Germany used Enigma; America created Sigaba; Britain developed Typex. The breaking of Enigma by…”
    Get full text
    Journal Article
  12. 12

    Efficient Cryptanalysis of Homophonic Substitution Ciphers by Dhavare, Amrapali, Low, Richard M., Stamp, Mark

    Published in Cryptologia (03-07-2013)
    “…Substitution ciphers are among the earliest methods of encryption. Examples of classic substitution ciphers include the well-known simple substitution and the…”
    Get full text
    Journal Article
  13. 13

    Juice, Pulp and Seeds Fractionated from Dry Climate Primocane Raspberry Cultivars (Rubus idaeus) Have Significantly Different Antioxidant Capacity, Anthocyanin Content and Color by Snyder, Shannon M., Low, Richard M., Stocks, Janet C., Eggett, Dennis L., Parker, Tory L.

    “…Raspberries contain flavonoid antioxidants whose relative concentrations may vary between the juice, pulp, and seed fractions. Oxygen radical absorbance…”
    Get full text
    Journal Article
  14. 14

    Notes on the combinatorial game: graph Nim by Low, Richard M., Chan, W.H.

    “…The combinatorial game of Nim can be played on graphs. Over the years, various Nim-like games on graphs have been proposed and studied by N.J. Calkin et al.,…”
    Get full text
    Journal Article
  15. 15
  16. 16

    Structural entropy and metamorphic malware by Baysa, Donabelle, Low, Richard M., Stamp, Mark

    “…Metamorphic malware is capable of changing its internal structure without altering its functionality. A common signature is nonexistent in highly metamorphic…”
    Get full text
    Journal Article
  17. 17

    Simple substitution distance and metamorphic detection by Shanmugam, Gayathri, Low, Richard M., Stamp, Mark

    “…To evade signature-based detection, metamorphic viruses transform their code before each new infection. Software similarity measures are a potentially useful…”
    Get full text
    Journal Article
  18. 18
  19. 19

    Application of the Combinatorial Nullstellensatz to Integer-magic Graph Labelings by Low, Richard M., Roberts, Dan

    “…Let $A$ be a nontrivial abelian group and $A^* = A \setminus \{0\}$. A graph is $A$-magic if there exists an edge labeling $f$ using elements of $A^*$ which…”
    Get full text
    Journal Article
  20. 20