Sciweavers

19 search results - page 1 / 4
» sec 2004
Sort
View
SEC
2004
13 years 5 months ago
An Abstract Reduction Model for Computer Security Risk
Mohamed Hamdi, Noureddine Boudriga
SEC
2004
13 years 5 months ago
Supporting End-to-end Security across Proxies with Multiple-Channel SSL
: Secure Socket Layer (SSL) has functional limitations that prevent end-to-end security in the presence of untrusted intermediary application proxies used by clients to communicate...
Yong Song, Victor C. M. Leung, Konstantin Beznosov
SEC
2004
13 years 5 months ago
Spam Filter Analysis
Unsolicited bulk email (aka. spam) is a major problem on the Internet. To counter spam, several techniques, ranging from spam filters to mail protocol extensions like hashcash, hav...
Flavio D. Garcia, Jaap-Henk Hoepman, Jeroen van Ni...
LISA
2004
13 years 5 months ago
Real-time Log File Analysis Using the Simple Event Correlator (SEC)
Originally published at Usenix LISA 2004 conference. November 2004 Atlanta, Georiga, USA. Log analysis is an important way to keep track of computers and networks. The use of auto...
John P. Rouillard