default search action
Information Security Technical Report, Volume 12
Volume 12, Number 1, 2007
- Stephen D. Wolthusen:
ISTR special issue on critical infrastructure protection. 1 - Walter Schmitz:
Simulation and test: Instruments for Critical Infrastructure Protection (CIP). 2-15 - Jan Arild Audestad:
Internet as a multiple graph structure: The role of the transport layer. 16-23 - Rodrigo Roman, Cristina Alcaraz
, Javier López
:
The role of Wireless Sensor Networks in the area of Critical Information Infrastructure Protection. 24-31 - Khaled Elgoarany, Mohamed Eltoweissy:
Security in Mobile IPv6: A survey. 32-43 - Nils Kalstad Svendsen, Stephen D. Wolthusen:
Connectivity models of interdependency in mixed-type critical infrastructure networks. 44-55 - Kalle Burbeck, Simin Nadjm-Tehrani:
Adaptive real-time anomaly detection with incremental clustering. 56-67
Volume 12, Number 2, 2007
- Andrew Jones
:
Convergence. 69-73 - Richard Clayton:
Can CLI be trusted? 74-79 - E. Eugene Schultz:
Risks due to convergence of physical security systems and information technology environments. 80-84 - Richard H. Paine:
Secure Mobile Architecture (SMA) - A way to fix the broken Internet. 85-89 - Paul King:
In the new converged world are we secure enough? 90-97 - Raj Samani:
When networks collide. 98-110
Volume 12, Number 3, 2007
- Allan Tomlinson:
Editorial. 111-112 - Andrew P. Martin
, Po-Wah Yau:
Grid security: Next steps. 113-122 - Haibo Chen, Jieyun Chen, Wenbo Mao, Fei Yan:
Daonity - Grid security from two levels of virtualization. 123-138 - Javier López
, Isaac Agudo
, José A. Montenegro:
On the deployment of a real scalable delegation service. 139-146 - David W. Chadwick
:
Coordinated decision making in distributed applications. 147-154 - Christof Paar, André Weimerskirch:
Embedded security in a pervasive world. 155-161 - Adrian Leung, Yingli Sheng, Haitham S. Cruickshank:
The security challenges for mobile ubiquitous services. 162-171 - Zia Hayat, Jeff Reeve, Chris Boutle:
Ubiquitous security for ubiquitous computing. 172-178 - Jianying Zhou
, Wee-Yung Chin, Rodrigo Roman, Javier López
:
An effective multi-layered defense framework against spam. 179-185
Volume 12, Number 4, 2007
- Michael J. Ganley:
Introduction to this issue (12/4). 187 - Richard E. Overill:
Computational immunology and anomaly detection. 188-191 - Mark Burgess:
Biology, immunology and information security. 192-199 - Robert Ghanea-Hercock:
Survival in cyberspace. 200-208 - Kamran Shafi, Hussein A. Abbass
:
Biologically-inspired Complex Adaptive Systems approaches to Network Intrusion Detection. 209-217 - Uwe Aickelin
, Julie Greensmith:
Sensing danger: Innate immunology for intrusion detection. 218-227 - Anil Somayaji:
Immunology, diversity, and homeostasis: The past and future of biologically inspired computer defenses. 228-234 - Dipankar Dasgupta:
Immuno-inspired autonomic system for cyber defense. 235-241 - Erol Gelenbe
:
Dealing with software viruses: A biological paradigm. 242-250
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.