Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
2904
search results - page 30 / 581
»
Internet Infrastructure Security
Sort
relevance
views
votes
recent
update
View
thumb
title
16
click to vote
SAINT
2007
IEEE
73
views
Internet Technology
»
more
SAINT 2007
»
Live E! Project: Establishment of Infrastructure Sharing Environmental Information
14 years 4 months ago
Download
hiroshi1.hongo.wide.ad.jp
Satoshi Matsuura, Hiroki Ishizuka, Hideya Ochiai, ...
claim paper
Read More »
23
click to vote
ACSAC
2000
IEEE
93
views
Security Privacy
»
more
ACSAC 2000
»
Scalable Policy Driven and General Purpose Public Key Infrastructure (PKI)
14 years 2 months ago
Download
www.acsac.org
V. Prasad, S. Potakamuri, M. Ahern, I. Balabine, M...
claim paper
Read More »
23
click to vote
CRITIS
2008
118
views
Security Privacy
»
more
CRITIS 2008
»
Critical Infrastructures as Complex Systems: A Multi-level Protection Architecture
13 years 11 months ago
Download
paoluzzi.dia.uniroma3.it
Pierluigi Assogna, Glauco Bertocchi, Antonio DiCar...
claim paper
Read More »
25
click to vote
ESORICS
2008
Springer
96
views
Security Privacy
»
more
ESORICS 2008
»
Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures?
13 years 11 months ago
Download
www.professeurs.polymtl.ca
Carlton R. Davis, Stephen Neville, José M. ...
claim paper
Read More »
30
click to vote
IDEAL
2004
Springer
143
views
Intelligent Agents
»
more
IDEAL 2004
»
Detecting Worm Propagation Using Traffic Concentration Analysis and Inductive Learning
14 years 3 months ago
Download
songsim.catholic.ac.kr
As a vast number of services have been flooding into the Internet, it is more likely for the Internet resources to be exposed to various hacking activities such as Code Red and SQL...
Sanguk Noh, Cheolho Lee, Keywon Ryu, Kyunghee Choi...
claim paper
Read More »
« Prev
« First
page 30 / 581
Last »
Next »