Integrating security in a large distributed system
ACM Transactions on Computer Systems (TOCS)
Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Balancing loads on SONET rings with integer demand splitting
Computers and Operations Research
Scalable high speed IP routing lookups
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
End-to-end routing behavior in the Internet
IEEE/ACM Transactions on Networking (TON)
Personal encryption clearly explained
Personal encryption clearly explained
Anonymous Web transactions with Crowds
Communications of the ACM
Packet classification using tuple space search
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Virtual private networks: making the right connection
Virtual private networks: making the right connection
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
MPLS: technology and applications
MPLS: technology and applications
Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Intrusion Detection
Fiber Network Service Survivability
Fiber Network Service Survivability
Broadband Networking: ATM, SDH, and SONET
Broadband Networking: ATM, SDH, and SONET
Toward cost-sensitive modeling for intrusion detection and response
Journal of Computer Security
Survivable Network System Analysis: A Case Study
IEEE Software
Code-Red: a case study on the spread and victims of an internet worm
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment
Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
Privacy: The Achilles Heel of Pervasive Computing?
IEEE Pervasive Computing
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
Preserving Privacy in Environments with Location-Based Applications
IEEE Pervasive Computing
Building Survivable Services Using Redundancy and Adaptation
IEEE Transactions on Computers
Autonomic Response to Distributed Denial of Service Attacks
RAID '00 Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection
Security Weaknesses in Bluetooth
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Weaknesses in the Key Scheduling Algorithm of RC4
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Experience with EMERALD to Date
Proceedings of the Workshop on Intrusion Detection and Network Monitoring
Attacks against the WAP WTLS protocol
CMS '99 Proceedings of the IFIP TC6/TC11 Joint Working Conference on Secure Information Networks: Communications and Multimedia Security
Survivability Analysis of Network Specifications
DSN '00 Proceedings of the 2000 International Conference on Dependable Systems and Networks (formerly FTCS-30 and DCCA-8)
Distributing Trust on the Internet
DSN '01 Proceedings of the 2001 International Conference on Dependable Systems and Networks (formerly: FTCS)
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Security flaws in 802.11 data link protocols
Communications of the ACM - Wireless networking security
Security agility in response to intrusion detection
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
Evaluating the Impact of Automated Intrusion Response Mechanisms
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
Toward Secure Key Distribution in Truly Ad-Hoc Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
Fault Tolerant WDM Rings with Limited Wavelength Conversion
INFOCOM '97 Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments
ICDCS '02 Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS'02)
Integrated Access Control and Intrusion Detection for Web Servers
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
Firewalls and Internet Security: Repelling the Wily Hacker
Firewalls and Internet Security: Repelling the Wily Hacker
Distributed Management Architecture for Cooperative Detection and Reaction to DDoS Attacks
Journal of Network and Systems Management
Roaming Honeypots for Mitigating Service-Level Denial-of-Service Attacks
ICDCS '04 Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS'04)
Network Security Assessment
DDoS attacks and defense mechanisms: classification and state-of-the-art
Computer Networks: The International Journal of Computer and Telecommunications Networking
A taxonomy of DDoS attack and DDoS defense mechanisms
ACM SIGCOMM Computer Communication Review
Autonomic defense: thwarting automated attacks via real-time feedback control
Complexity - Special issue: Resilient and adaptive defense of computing networks
Wireless infidelity I: war driving
Communications of the ACM - End-user development: tools that empower users to create their own software solutions
The Tao Of Network Security Monitoring: Beyond Intrusion Detection
The Tao Of Network Security Monitoring: Beyond Intrusion Detection
Adaptive Cyberdefense for Survival and Intrusion Tolerance
IEEE Internet Computing
Security analysis of SITAR intrusion tolerance system
Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security
IEEE/ACM Transactions on Networking (TON)
Penetration Testing and Cisco Network Defense
Penetration Testing and Cisco Network Defense
ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment
DSN '05 Proceedings of the 2005 International Conference on Dependable Systems and Networks
Implementing Trustworthy Services Using Replicated State Machines
IEEE Security and Privacy
Inside Network Perimeter Security (2nd Edition) (Inside)
Inside Network Perimeter Security (2nd Edition) (Inside)
Automated adaptive intrusion containment in systems of interacting services
Computer Networks: The International Journal of Computer and Telecommunications Networking
Network security: private communication in a public world, second edition
Network security: private communication in a public world, second edition
Hi-index | 0.00 |
Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security.Assembled from the works of leading researchers and practitioners, this best-of-the-best collection of chapters on network security and survivability is a valuable and handy resource. It consolidates content from the field's leading experts while creating a one-stop-shopping opportunity for readers to access the information only otherwise available from disparate sources.* Chapters contributed by recognized experts in the field cover theory and practice of network security technology, allowing the reader to develop a new level of knowledge and technical expertise. * Up-to-date coverage of network security issues facilitates learning and lets the reader remain current and fully informed from multiple viewpoints.* Presents methods of analysis and problem-solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions.* Examples illustrate core security concepts for enhanced comprehension