Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
2904
search results - page 30 / 581
»
Internet Infrastructure Security
Sort
relevance
views
votes
recent
update
View
thumb
title
74
Voted
SAINT
2007
IEEE
73
views
Internet Technology
»
more
SAINT 2007
»
Live E! Project: Establishment of Infrastructure Sharing Environmental Information
15 years 9 months ago
Download
hiroshi1.hongo.wide.ad.jp
Satoshi Matsuura, Hiroki Ishizuka, Hideya Ochiai, ...
claim paper
Read More »
91
click to vote
ACSAC
2000
IEEE
93
views
Security Privacy
»
more
ACSAC 2000
»
Scalable Policy Driven and General Purpose Public Key Infrastructure (PKI)
15 years 7 months ago
Download
www.acsac.org
V. Prasad, S. Potakamuri, M. Ahern, I. Balabine, M...
claim paper
Read More »
99
Voted
CRITIS
2008
118
views
Security Privacy
»
more
CRITIS 2008
»
Critical Infrastructures as Complex Systems: A Multi-level Protection Architecture
15 years 5 months ago
Download
paoluzzi.dia.uniroma3.it
Pierluigi Assogna, Glauco Bertocchi, Antonio DiCar...
claim paper
Read More »
82
click to vote
ESORICS
2008
Springer
96
views
Security Privacy
»
more
ESORICS 2008
»
Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures?
15 years 5 months ago
Download
www.professeurs.polymtl.ca
Carlton R. Davis, Stephen Neville, José M. ...
claim paper
Read More »
128
Voted
IDEAL
2004
Springer
143
views
Intelligent Agents
»
more
IDEAL 2004
»
Detecting Worm Propagation Using Traffic Concentration Analysis and Inductive Learning
15 years 8 months ago
Download
songsim.catholic.ac.kr
As a vast number of services have been flooding into the Internet, it is more likely for the Internet resources to be exposed to various hacking activities such as Code Red and SQL...
Sanguk Noh, Cheolho Lee, Keywon Ryu, Kyunghee Choi...
claim paper
Read More »
« Prev
« First
page 30 / 581
Last »
Next »