Port Scans and Ping Sweeps Explained
Linux Journal
A novel computer architecture to prevent destruction by viruses
Journal of Computer Science and Technology
DEVS Simulation of distributed intrusion detection systems
Transactions of the Society for Computer Simulation International - Recent advances in DEVS Methodology--part I
Simulation of Network Security with Collaboration among IDS Models
AI '01 Proceedings of the 14th Australian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence
Formal description of perfect security
ICCC '02 Proceedings of the 15th international conference on Computer communication
Active security management based on secure zone cooperation
Future Generation Computer Systems - Special issue: Modeling and simulation in supercomputing and telecommunications
A method for designing secure solutions
IBM Systems Journal - End-to-end security
PRISM: A Preventive and Risk-Reducing Integrated Security Management Model Using Security Label
The Journal of Supercomputing
Generic denial of service prevention through a logical fibering algorithm
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
Modeling and simulation of distributed security models
ICCS'03 Proceedings of the 2003 international conference on Computational science
Hi-index | 0.00 |
From the Book:My experience in securing systems is that most users are shocked when they find out how vulnerable they really are. Perhaps this book will shock you. No matter what, it will educate you.