Sciweavers

2904 search results - page 180 / 581
» Internet Infrastructure Security
Sort
View
AVI
2000
15 years 5 months ago
Architectures to make Simple Visualisations using Simple Systems
In previous work, the first author argued for simple lightweight visualisations. These are surprisingly complex to produce due to the need for infrastructure to read files, etc. o...
Alan J. Dix, Russell Beale, Andy Wood
JDFP
2006
98views more  JDFP 2006»
15 years 3 months ago
Badvertisements: Stealthy Click-Fraud with Unwitting Accessories
We describe a new type of threat to the Internet infrastructure, in the shape of a highly efficient but very well camouflaged click-fraud attack on the advertising infrastructure....
Mona Gandhi, Markus Jakobsson, Jacob Ratkiewicz
OTM
2005
Springer
15 years 9 months ago
Security Ontology for Annotating Resources
Annotation with security-related metadata enables discovery of resources that meet security requirements. This paper presents the NRL Security Ontology, which complements existing ...
Anya Kim, Jim Luo, Myong H. Kang
ICWS
2004
IEEE
15 years 5 months ago
Best-Practice Patterns and Tool Support for Configuring Secure Web Services Messaging
This paper presents an emerging tool for security configuration of service-oriented architectures with Web Services. Security is a major concern when implementing mission-critical...
Michiaki Tatsubori, Takeshi Imamura, Yuhichi Nakam...
PAM
2005
Springer
15 years 9 months ago
Scalable Coordination Techniques for Distributed Network Monitoring
Abstract. Emerging network monitoring infrastructures capture packetlevel traces or keep per-flow statistics at a set of distributed vantage points. Today, distributed monitors in...
Manish R. Sharma, John W. Byers