Sciweavers

2904 search results - page 22 / 581
» Internet Infrastructure Security
Sort
View
CRITIS
2008
13 years 11 months ago
Emerging Information Infrastructures: Cooperation in Disasters
Mikael Asplund, Simin Nadjm-Tehrani, Johan Sigholm
CRITIS
2007
13 years 11 months ago
An Approach to Trust Management Challenges for Critical Infrastructures
Ioanna Dionysiou, Deborah A. Frincke, David E. Bak...
WEBI
2009
Springer
14 years 4 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
ICEGOV
2007
ACM
14 years 1 months ago
Formal threat descriptions for enhancing governmental risk assessment
Compared to the last decades, we have recently seen more and more governmental applications which are provided via the Internet directly to the citizens. Due to the long history o...
Andreas Ekelhart, Stefan Fenz, Thomas Neubauer, Ed...
WORM
2003
13 years 11 months ago
Experiences with worm propagation simulations
Fast Internet worms are a relatively new threat to Internet infrastructure and hosts. We discuss motivation and possibilities to study the behaviour of such worms and degrees of f...
Arno Wagner, Thomas Dübendorfer, Bernhard Pla...