Sciweavers

3149 search results - page 55 / 630
» IT security risk management
Sort
View
NDSS
2009
IEEE
14 years 2 months ago
Recursive DNS Architectures and Vulnerability Implications
DNS implementers face numerous choices in architecting DNS resolvers, each with profound implications for security. Absent the use of DNSSEC, there are numerous interim techniques...
David Dagon, Manos Antonakakis, Kevin Day, Xiapu L...
ISSRE
2003
IEEE
14 years 1 months ago
A Framework for Tamper Detection Marking of Mobile Applications
Today’s applications are highly mobile; we download software from the Internet, machine executable code arrives attached to electronic mail, and Java applets increase the functi...
Mike Jochen, Lisa M. Marvel, Lori L. Pollock
SIAMFM
2011
75views more  SIAMFM 2011»
12 years 10 months ago
Dynamic Hedging of Portfolio Credit Derivatives
As shown by the recent turmoil in credit markets, much remains to be done for the proper risk management of credit derivatives. In particular, the static copula-based models commo...
Rama Cont, Yu Hang Kan
IEEEARES
2010
IEEE
14 years 2 months ago
Information Flow in Disaster Management Systems
Achim D. Brucker, Dieter Hutter