Sciweavers

729 search results - page 3 / 146
» Towards Secure e-Services
Sort
View
IEEEARES
2009
IEEE
15 years 6 months ago
A First Step towards Characterizing Stealthy Botnets
Justin Leonard, Shouhuai Xu, Ravi S. Sandhu
ACISP
2006
Springer
15 years 3 months ago
Towards an Invisible Honeypot Monitoring System
Anh-Quynh Nguyen, Yoshiyasu Takefuji
ACSAC
1999
IEEE
15 years 4 months ago
Toward a Taxonomy and Costing Method for Security Services
A wide range of security services may be available to applications in a heterogeneous computer network environment. Resource Management Systems (RMSs) responsible for assigning co...
Cynthia E. Irvine, Timothy E. Levin