Management of security in TCP/IP hosts using dedicated monitoring applications
Network control and engineering for Qos, security and mobility II
Representation and analysis of coordinated attacks
Proceedings of the 2003 ACM workshop on Formal methods in security engineering
Knowledge discovery and experience modeling in computer forensics media analysis
ISICT '04 Proceedings of the 2004 international symposium on Information and communication technologies
Anomalous path detection with hardware support
Proceedings of the 2005 international conference on Compilers, architectures and synthesis for embedded systems
An ethics and security course for students in computer science and information technology
Proceedings of the 37th SIGCSE technical symposium on Computer science education
Analysis of internet backbone traffic and header anomalies observed
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Show Me How You See: Lessons from Studying Computer Forensics Experts for Visualization
VizSec '08 Proceedings of the 5th international workshop on Visualization for Computer Security
Review: Passive internet measurement: Overview and guidelines based on experiences
Computer Communications
Integrating service discovery technologies in OSGi platform
Computer Standards & Interfaces
SAPA: software agents for prevention and auditing of security faults in networked systems
ICOIN'05 Proceedings of the 2005 international conference on Information Networking: convergence in broadband and mobile networking
Hi-index | 4.10 |
Organizations relying on the Internet face significant challenges to ensure that their networks operate safely and that their systems continue to provide critical services even in the face of attack. The article seeks to help raise awareness of some of those challenges by providing an overview of current trends in attack techniques and tools