IBM Systems Journal
An analysis of security incidents on the Internet 1989-1995
An analysis of security incidents on the Internet 1989-1995
Finding a Connection Chain for Tracing Intruders
ESORICS '00 Proceedings of the 6th European Symposium on Research in Computer Security
Holding intruders accountable on the Internet
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
IEEE Communications Magazine
The session token protocol for forensics and traceback
ACM Transactions on Information and System Security (TISSEC)
A taxonomy of intrusion response systems
International Journal of Information and Computer Security
Network-based real-time connection traceback system (NRCTS) with packet marking technology
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartII
Hi-index | 0.00 |
There is a scale between authentication and anonymity, which is currently leaning towards the side of authentication, when it comes to e-commerce. Service providers and merchants are usually keeping track of user-related information in order to construct ...