Výsledky vyhľadávania - "Security and Protection General Terms Algorithms"
-
1
Autori: a ďalší
Prispievatelia: a ďalší
Predmety: Categories and Subject Descriptors C.2.3 [Computer-Communication Networks, Network Opera- tions—network monitoring, network management, C.2.0 [Computer- Communication Networks, General—Security and protection General Terms Algorithms, Management, Security Keywords Intrusion Detection
Popis súboru: application/pdf
-
2
Autori:
Prispievatelia:
Popis súboru: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.364.9147; http://www.ics.uci.edu/~goodrich/pubs/codaspy12.pdf
-
3
Autori:
Prispievatelia:
Predmety: Categories and Subject Descriptors H.2.8 [Database Management, Database applications— Data mining, C.2.0 [Computer Communication Networks, General—security and protection General Terms Algorithms, Experimentation, Measurement, Security Keywords IPSizeEstimation, AbusiveTrafficFiltering, Advertisement Click Fraud, Real Data Experiments
Popis súboru: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.389.1394; http://users.cis.fiu.edu/~lzhen001/activities/KDD2011Program/docs/p249.pdf
-
4
Autori:
Prispievatelia:
Predmety: Categories and Subject Descriptors H.2.8 [Database Management, Database applications— Data mining, C.2.0 [Computer Communication Net- works, General—security and protection General Terms Algorithms, Experimentation, Measurement, Security Keywords IP Size Estimation, Abusive Traffic Filtering, Advertisement Click Fraud, Real Data Experiments
Popis súboru: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.677.180; http://static.googleusercontent.com/media/research.google.com/en/us/pubs/archive/35769.pdf
-
5
Autori:
Prispievatelia:
Predmety: Categories and Subject Descriptors C.2.4 [Computer-Communication Networks, Distributed Systems, C.2.0 [Computer-Communication Networks, General—Security and Protection General Terms Algorithms, Security Keywords Anonymous Communication, Peer-to-Peer Networks
Popis súboru: application/pdf
-
6
Autori: a ďalší
Prispievatelia: a ďalší
Predmety: Categories and Subject Descriptors C.2.3 [Computer-Communication Networks, Network Operations—network monitoring, C.2.0 [Computer-Communication Networks, General—Security and protection General Terms Algorithms, Measurement, Security Keywords Botnet, Global property extrapolation, Honeynet, Scan strategy inference, Situational awareness, Statistical inference
Popis súboru: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.219.6617; http://www.cs.northwestern.edu/~ychen/Papers/asiaccs09.pdf
-
7
Autori: a ďalší
Prispievatelia: a ďalší
Predmety: Networks, General—security and protection General Terms Algorithms, Measurement, Security Keywords Spam, botnet, regular expression, signature generation
Popis súboru: application/pdf
-
8
Autori: a ďalší
Prispievatelia: a ďalší
Zdroj: http://fuxi.cs.txstate.edu/~nasdg/papers/2007ccs/Highly efficient techniques for network forensics 2007.pdf.
Predmety: Categories and Subject Descriptors C.2.0 [Computer-Communication Networks, General— Security and protection General Terms Algorithms, Performance, Security Keywords Payload Attribution, Bloom Filter, Network Forensics
Popis súboru: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.333.2451; http://fuxi.cs.txstate.edu/~nasdg/papers/2007ccs/Highly efficient techniques for network forensics 2007.pdf
Dostupnosť: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.333.2451
http://fuxi.cs.txstate.edu/~nasdg/papers/2007ccs/Highly efficient techniques for network forensics 2007.pdf -
9
Autori:
Prispievatelia:
Predmety: Categories and Subject Descriptors D.2.7 [Software Engineering, Distribution, Maintenance, and Enhancement, D.4.6 [Operating Systems, Security and Protection General Terms Algorithms, Design, Reliability, Security Keywords dynamic software updates, dynamic instrumentation, function cloning, adaptive operating system, DynAMOS
Popis súboru: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.99.4340; http://files.mkgnu.net/files/dynamos/doc/papers/dynamos_eurosys_07.pdf
-
10
Autori: a ďalší
Prispievatelia: a ďalší
Predmety: Categories and Subject Descriptors C.2.2 [Computer-Communication Networks, Network Protocols, D.4.6 [Operating Systems, Security and Protection General Terms Algorithms, Design, Experimentation, Performance, Reliability, Security Keywords Wireless Sensor Networks, Dissemination Protocols, Network Programming, Authenticated Broadcast, Security
Popis súboru: application/pdf
-
11
Autori: a ďalší
Prispievatelia: a ďalší
Predmety: Categories and Subject Descriptors C.2.0 [Computer-Communication Networks, General—Secu- rity and protection, C.2.1 [Computer-Communication Networks, Network Architecture and Design—Wireless communication, D.4.6 [Operating Systems, Security and Protection—Cryptographic con- trols, K.6.5 [Management of Computing and Information Sys- tems, Security and Protection General Terms Algorithms, Design, Security Keywords Sensor Network Security, Data Aggregation, Hierarchical Aggre- gation, Synopsis Diffusion, Attack-Resilient
Popis súboru: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.497.1814; http://cs.gmu.edu/~setia/arsd.pdf
-
12
Autori: a ďalší
Prispievatelia: a ďalší
Predmety: Categories and Subject Descriptors C.2.2 [Computer-Communication Networks, Network Protocols, D.4.6 [Operating Systems, Security and Protection General Terms Algorithms, Design, Experimentation, Performance, Reliability, Security Keywords Wireless Sensor Networks, Dissemination Protocols, Network Programming, Authenticated Broadcast, Security
Popis súboru: application/pdf
-
13
Autori:
Prispievatelia:
Predmety: Categories and Subject Descriptors K, 4.4 [Electronic Commerce, Security and Intellectual property, K.6.5 [Management of Computing and Information Systems, Security and Protection General Terms Algorithms, Security Keywords Ambiguity attack, Robustness, Security, Watermark, Zeroknowledge detection
Popis súboru: application/pdf
-
14
Autori: a ďalší
Prispievatelia: a ďalší
Predmety: D.2.3 [Operating Systems, Security and Protection General Terms Algorithms, Programming languages, Software security, Vulnerabilities, Software errors. Keywords Program analysis, context-sensitive, pointer analysis, type safety
Popis súboru: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.9320; http://suif.stanford.edu/papers/icse05.pdf
-
15
Autori:
Prispievatelia:
Predmety: Categories and Subject Descriptors D.4.6 [Software, Security and Protection—Access controls, K.6.5 [Computing Millieux, Security and Protection General Terms Algorithms, Security Keywords role-based access control
Popis súboru: application/pdf
-
16
Autori:
Prispievatelia:
Predmety: Categories and Subject Descriptors D.4.6 [Software, Security and Protection—Access controls, K.6.5 [Computing Millieux, Security and Protection General Terms Algorithms, Security Keywords role-based access control
Popis súboru: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.68.5244; http://www.csd.uwo.ca/faculty/sylvia/xml.pdf
-
17
Autori:
Prispievatelia:
Predmety: Categories and Subject Descriptors D.2 [Software, Software Engineering, D.2.5 [Software Engineering, Testing and Debugging, D.4 [Software, Operating Systems, D.4.6 [Operating Systems, Security and Protection General Terms Algorithms, experimentation, measurement, security. Keywords Anti-virus, adaptive testing, malware, obfuscation
Popis súboru: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.618.6975; http://cecs.wright.edu/cop/cybw/Christodorescu_Mihai_.pdf
-
18
Autori: a ďalší
Prispievatelia: a ďalší
Zdroj: http://www.mnlab.cs.depaul.edu/~mtaibah/papers/Others/Defensive technology_ Epidemic profiles and defense of scale-free networks.pdf.
Predmety: security and protection General Terms Algorithms, Security Keywords Scale-free networks, computer epidemics, self-propagating malicious
Popis súboru: application/pdf
Dostupnosť: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.133.7107
http://www.mnlab.cs.depaul.edu/~mtaibah/papers/Others/Defensive technology_ Epidemic profiles and defense of scale-free networks.pdf -
19
Autori: a ďalší
Prispievatelia: a ďalší
Predmety: ity, Nonnumerical Algorithms and Problems, D.4.6 [Operating Systems, Security and Protection General Terms Algorithms, Security
Popis súboru: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.584.3879; http://www.fkerschbaum.org/wpes03.pdf
-
20
Autori:
Prispievatelia:
Predmety: Categories and Subject Descriptors D.2.5 [Software Engineering, Testing and Debugging, D.2.3 [Operating Systems, Security and Protection General Terms Algorithms, Languages, Software Security
Popis súboru: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.2.1561; http://suif.stanford.edu/~livshits/work/fse03v.pdf
Nájsť tento článok vo Web of Science