Pascal and Francis Bibliographic Databases

Help

Search results

Your search

cc.\*:("001D04B03E")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 844

  • Page / 34
Export

Selection :

  • and

Hidden and under control: A survey and outlook on covert channel-internal control protocolsWENDZEL, Steffen; KELLER, Jörg.Annales des télécommunications. 2014, Vol 69, Num 7-8, pp 417-430, issn 0003-4347, 14 p.Article

FADE: Forwarding Assessment Based Detection of Collaborative Grey Hole Attacks in WMNsQIANG LIU; JIANPING YIN; LEUNG, Victor C. M et al.IEEE transactions on wireless communications. 2013, Vol 12, Num 10, pp 5124-5137, issn 1536-1276, 14 p.Article

How to Make Content Centric Network (CCN) More Robust against DoS/DDoS AttackKIM, Daeyoub; LEE, Jihoon.IEICE transactions on communications. 2013, Vol 96, Num 1, pp 313-316, issn 0916-8516, 4 p.Article

Modeling Information Dissemination in Generalized Social NetworksCHOU, Yu-Feng; HUANG, Hsin-Heng; CHENG, Ray-Guang et al.IEEE communications letters. 2013, Vol 17, Num 7, pp 1356-1359, issn 1089-7798, 4 p.Article

Detection of distributed denial of service attacks in cloud computing by identifying spoofed IPJEYANTHI, N; BARDE, Uttara; SRAVANI, M et al.International journal of communication networks and distributed systems (Print). 2013, Vol 11, Num 3, pp 262-279, issn 1754-3916, 18 p.Article

VMM detection using privilege rings and benchmark execution timesSHARIFI, Mohsen; SALIMI, Hadi; SABERI, Alireza et al.International journal of communication networks and distributed systems (Print). 2013, Vol 11, Num 3, pp 310-326, issn 1754-3916, 17 p.Article

Adaptive Timer-Based Countermeasures against TCP SYN Flood AttacksTANABE, Masao; AKAIKE, Hirofumi; AIDA, Masaki et al.IEICE transactions on communications. 2012, Vol 95, Num 3, pp 866-875, issn 0916-8516, 10 p.Article

Graph Coloring Applied to Secure Computation in Non-Abelian GroupsDESMEDT, Yvo; PIEPRZYK, Josef; STEINFELD, Ron et al.Journal of cryptology. 2012, Vol 25, Num 4, pp 557-600, issn 0933-2790, 44 p.Article

Impact of Primary User Emulation Attacks on Dynamic Spectrum Access NetworksJIN, Z; ANAND, S; SUBBALAKSHMI, K. P et al.IEEE transactions on communications. 2012, Vol 60, Num 9, pp 2635-2643, issn 0090-6778, 9 p.Article

Secure Two-Party Computation via Cut-and-Choose Oblivious TransferLINDELL, Yehuda; PINKAS, Benny.Journal of cryptology. 2012, Vol 25, Num 4, pp 680-722, issn 0933-2790, 43 p.Article

Réseaux et cybercriminalité, l'opérateur au cœur de la bataille : Les cyber-attaques, un risque pour nos grandes infractructures ?CARON, Pierre.REE. Revue de l'électricité et de l'électronique. 2012, Num 2, pp 36-44, issn 1265-6534, 9 p.Article

Optical Network Management and ControlDOVERSPIKE, Robert D; YATES, Jennifer.Proceedings of the IEEE. 2012, Vol 100, Num 5, pp 1092-1104, issn 0018-9219, 13 p.Article

A fuzzy pattern-based filtering algorithm for botnet detectionWANG, Kuochen; HUANG, Chun-Ying; LIN, Shang-Jyh et al.Computer networks (1999). 2011, Vol 55, Num 15, pp 3275-3286, issn 1389-1286, 12 p.Article

Bit Commitment From Nonsignaling CorrelationsWINKLER, Severin; WULLSCHLEGER, Jiirg; WOLF, Stefan et al.IEEE transactions on information theory. 2011, Vol 57, Num 3, pp 1770-1779, issn 0018-9448, 10 p.Article

SplitScreen: Enabling Efficient, Distributed Malware DetectionSANG KIL CHA; MORARU, Iulian; JIYONG JANG et al.Journal of communication and networks (Seoul. Print). 2011, Vol 13, Num 2, pp 187-200, issn 1229-2370, 14 p.Article

Usability study of text-based CAPTCHAsLEE, Ying-Lien; HSU, Chih-Hsiang.Displays. 2011, Vol 32, Num 2, pp 81-86, issn 0141-9382, 6 p.Article

Rethinking Business Model in Cloud Computing: Concept and Example : Information and Communication System SecurityPING DU; NAKAO, Akihiro.IEICE transactions on information and systems. 2011, Vol 94, Num 11, pp 2119-2128, issn 0916-8532, 10 p.Article

Fast Filtered SamplingJIANNING MAI; SRIDHARAN, Ashwin; HUI ZANG et al.Computer networks (1999). 2010, Vol 54, Num 11, pp 1885-1898, issn 1389-1286, 14 p.Article

Mitigating application layer distributed denial of service attacks via effective trust managementYU, J; FANG, C; LU, L et al.IET communications (Print). 2010, Vol 4, Num 16, pp 1952-1962, issn 1751-8628, 11 p.Article

HiFIND: A high-speed flow-level intrusion detection approach with DoS resiliencyZHICHUN LI; YAN GAO; YAN CHEN et al.Computer networks (1999). 2010, Vol 54, Num 8, pp 1282-1299, issn 1389-1286, 18 p.Article

Security Core to the Edge: Securing Critical Information through Enhanced Cross Domain Systems (CDS) to the Tactical EdgeFARROHA, Bassam S; FARROHA, Deborah L; WHITFIELD, Melinda M et al.Proceedings of SPIE, the International Society for Optical Engineering. 2010, Vol 7707, issn 0277-786X, isbn 9780819481719, 77070M.1-77070M.12Conference Paper

A lightweight web-based vulnerability scanner for small-scale computer network security assessmentDAVIES, Pete; TRYFONAS, Theodore.Journal of network and computer applications. 2009, Vol 32, Num 1, pp 78-95, issn 1084-8045, 18 p.Article

Firewall policy verification and troubleshootingLIU, Alex X.Computer networks (1999). 2009, Vol 53, Num 16, pp 2800-2809, issn 1389-1286, 10 p.Article

Modeling Propagation Dynamics of Bluetooth Worms (Extended Version)GUANHUA YAN; EIDENBENZ, Stephan.IEEE transactions on mobile computing. 2009, Vol 8, Num 3, pp 353-368, issn 1536-1233, 16 p.Article

Multiphase intrusion detection and revocation system for wireless sensor networksDE OLIVEIRA, Sérgio; MARCOS NOGUEIRA, José; WONG, Hao-Chi et al.International journal of communication networks and distributed systems (Print). 2009, Vol 2, Num 1, pp 99-111, issn 1754-3916, 13 p.Article

  • Page / 34