Sciweavers

367 search results - page 74 / 74
» Security Design in Online Games
Sort
View
ITPRO
2007
101views more  ITPRO 2007»
13 years 5 months ago
Beyond Search: Content Applications
Federation of Abstracting and Information Services presentation (“TheThomsonTransformation: Remaking a Global 500 Company,” http://www. nfais.org/TurnerNFAIS06.ppt). Now conten...
Stephen Buxton
COMCOM
2008
135views more  COMCOM 2008»
13 years 5 months ago
Peer-to-peer system-based active worm attacks: Modeling, analysis and defense
Active worms continue to pose major threats to the security of today's Internet. This is due to the ability of active worms to automatically propagate themselves and compromi...
Wei Yu, Sriram Chellappan, Xun Wang, Dong Xuan