Sciweavers

48 search results - page 10 / 10
» Controlling resource access in Directed Bigraphs
Sort
View
ICC
2009
IEEE
115views Communications» more  ICC 2009»
14 years 2 days ago
End-Host Authentication and Authorization for Middleboxes Based on a Cryptographic Namespace
—Today, middleboxes such as firewalls and network address translators have advanced beyond simple packet forwarding and address mapping. They also inspect and filter traffic, ...
Tobias Heer, René Hummen, Miika Komu, Stefa...
AUSFORENSICS
2003
13 years 6 months ago
Computer Forensics in the Global Enterprise
The increase in cyber-crime has created the need for security technologies that are always one step ahead of the criminal. Computer forensics and incident response solutions allow...
Melisa Bleasdale, Scott Mann, John Patzakis
IJDE
2006
95views more  IJDE 2006»
13 years 5 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum