Sciweavers

2904 search results - page 30 / 581
» Internet Infrastructure Security
Sort
View
ACSAC
2000
IEEE
15 years 7 months ago
Scalable Policy Driven and General Purpose Public Key Infrastructure (PKI)
V. Prasad, S. Potakamuri, M. Ahern, I. Balabine, M...
92
Voted
CRITIS
2008
15 years 4 months ago
Critical Infrastructures as Complex Systems: A Multi-level Protection Architecture
Pierluigi Assogna, Glauco Bertocchi, Antonio DiCar...
78
Voted
ESORICS
2008
Springer
15 years 4 months ago
Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures?
Carlton R. Davis, Stephen Neville, José M. ...
121
Voted
IDEAL
2004
Springer
15 years 8 months ago
Detecting Worm Propagation Using Traffic Concentration Analysis and Inductive Learning
As a vast number of services have been flooding into the Internet, it is more likely for the Internet resources to be exposed to various hacking activities such as Code Red and SQL...
Sanguk Noh, Cheolho Lee, Keywon Ryu, Kyunghee Choi...