|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 741 occurrences of 469 keywords
|
|
|
Results
Found 803 publication records. Showing 803 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
9 | Sébastien Jourdain, Julien Forest, Christophe Mouton, Bernard Nouailhas, Gerard Moniot, Franck Kolb, Sophie Chabridon, Michel Simatic, Zied Abid, Laurent Mallet |
ShareX3D, a scientific collaborative 3D viewer over HTTP. |
Web3D |
2008 |
DBLP DOI BibTeX RDF |
web networking, collaboration, scientific visualization, X3D, Web3D, postprocessing |
9 | Rafael Bosse Brinhosa, Carlos Becker Westphall, Carla Merkle Westphall |
A Security Framework for Input Validation. |
SECURWARE |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Sergio Pozo Hidalgo, Rafael Ceballos, Rafael M. Gasca, Angel Jesus Varela-Vaca |
Polynomial Heuristic Algorithms for Inconsistency Characterization in Firewall Rule Sets. |
SECURWARE |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Daniel Lorenz 0001, Peter Buchholz 0002, Christian Uebing, Wolfgang Walkowiak, Roland Wismüller |
Secure Communication for Computational Steering of Grid Jobs. |
PDP |
2008 |
DBLP DOI BibTeX RDF |
Security, Communication, Interactivity, Grid, Computational Steering |
9 | Simon N. Foley, William M. Fitzgerald |
Semantic Web and firewall alignment. |
ICDE Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Tich Phuoc Tran, Pohsiang Tsai, Tony Jan |
A Multi-expert Classification Framework with Transferable Voting for Intrusion Detection. |
ICMLA |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Sourour Meharouech, Adel Bouhoula, Tarek Abbes |
Collaboration between Security Devices toward improving Network Defense. |
ACIS-ICIS |
2008 |
DBLP DOI BibTeX RDF |
Collaboration between Security Devices, vulnerability scanner, Network Security, Firewall, Honeypot, IPS |
9 | Maverson Eduardo Schulze Rosa, Aldo Nascimento, Luciano Sytnifc, Elias Procópio Duarte Jr. |
JXTA PEER SNMP: An SNMP peer for inter-domain management. |
NOMS |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Sergio Pozo Hidalgo, Rafael Ceballos, Rafael Martinez Gasca |
Fast Algorithms for Consistency-Based Diagnosis of Firewall Rule Sets. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
consistency, diagnosis, firewall, conflict, acl, rule set |
9 | Navya Sidharth, Jigang Liu |
Intrusion Resistant SOAP Messaging with IAPF. |
APSCC |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Eli Brosh, Salman Baset, Dan Rubenstein, Henning Schulzrinne |
The delay-friendliness of TCP. |
SIGMETRICS |
2008 |
DBLP DOI BibTeX RDF |
TDP congestion control, performance modeling, VoIP, live video streaming |
9 | Vineet Chadha, David Wolinsky, Renato J. O. Figueiredo |
Provisioning of virtual environments for wide area desktop grids through redirect-on-write distributed file system. |
IPDPS |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Xin Li |
NSIS-Based Firewall Detection in Mobile IPv6. |
ICN |
2008 |
DBLP DOI BibTeX RDF |
Next Steps in Signaling (NSIS), Firewall Detection, Firewall Traversal, Mobile IPv6 |
9 | Hung Xuan Nguyen, Daniel R. Figueiredo 0001, Matthias Grossglauser, Patrick Thiran |
Balanced Relay Allocation on Heterogeneous Unstructured Overlays. |
INFOCOM |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Jean-Chrysostome Bolot, Marc Lelarge |
A New Perspective on Internet Security using Insurance. |
INFOCOM |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Thomas Fieseler, Wolfgang Gürich |
Operation of the Core D-Grid Infrastructure. |
CCGRID |
2008 |
DBLP DOI BibTeX RDF |
grid operation, grid middleware, grid infrastructure |
9 | Mirco Marchetti, Michele Colajanni |
Adaptive traffic filtering for efficient and secure IP-mobility. |
Q2SWinet |
2008 |
DBLP DOI BibTeX RDF |
dynamic firewall reconfiguration, egress filtering, mobile IP |
9 | Humphrey Waita Njogu, Xiehua Li |
Combating TCP Based Attacks on Mobile Devices. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Yiwen Liang, Wenjun Deng |
Verify Consistency between Security Policy and Firewall Policy with Answer Set Programming. |
CSSE (1) |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Irfan A. Siddavatam, Jayant Gadge |
Comprehensive test mechanism to detect attack on Web Services. |
ICON |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Hideo Saito, Ken Hironaka, Kenjiro Taura |
A scalable high-performance communication library for wide-area environments. |
GRID |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Mohammad Mehdi Gilanian Sadeghi, Borhanuddin Mohd Ali, Hossein Pedram, Mehdi Dehghan 0001, Masoud Sabaei |
A New Method for Creating Efficient Security Policies in Virtual Private Network. |
CollaborateCom |
2008 |
DBLP DOI BibTeX RDF |
IPsec policies, security policy, security requirement, virtual private network |
9 | Fedor V. Yarochkin, Shih-Yao Dai, Chih-Hung Lin, Yennun Huang, Sy-Yen Kuo |
Towards Adaptive Covert Communication System. |
PRDC |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Hamid Tabatabaee Yazdi, Amin Milani Fard, Mohammad R. Akbarzadeh-Totonchi |
Cooperative criminal face recognition in distributed web environment. |
AICCSA |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Eric Osterweil, Michael Ryan, Daniel Massey, Lixia Zhang 0001 |
Quantifying the operational status of the DNSSEC deployment. |
Internet Measurement Conference |
2008 |
DBLP DOI BibTeX RDF |
internet-scale security, measurement, metrics, dnssec |
9 | JeeHyun Hwang, Tao Xie 0001, Fei Chen 0001, Alex X. Liu |
Systematic Structural Testing of Firewall Policies. |
SRDS |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Linda Wilbanks |
Cybersecurity: Welcome to My World. |
IT Prof. |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Simon Liu, Larry Holt, Bruce Cheng |
A Practical Vulnerability Assessment Program. |
IT Prof. |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Jean-Philippe Martin-Flatin, Gabriel Jakobson, Lundy Lewis |
Event Correlation in Integrated Management: Lessons Learned and Outlook. |
J. Netw. Syst. Manag. |
2007 |
DBLP DOI BibTeX RDF |
Event-based management, Rule-based reasoning systems, Case-based reasoning systems, Network management, Service management, System management, Self-organizing systems, Event correlation, Self-adaptive systems, Integrated management |
9 | Songqing Chen, Bo Shen 0003, Susie J. Wee, Xiaodong Zhang 0001 |
SProxy: A Caching Infrastructure to Support Internet Streaming. |
IEEE Trans. Multim. |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Elizabeth A. Nichols, Gunnar Peterson |
A Metrics Framework to Drive Application Security Improvement. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Arijit Ganguly, Abhishek Agrawal, P. Oscar Boykin, Renato J. O. Figueiredo |
WOW: Self-organizing Wide Area Overlay Networks of Virtual Workstations. |
J. Grid Comput. |
2007 |
DBLP DOI BibTeX RDF |
Clusters, Grid computing, Networks, P2P, Virtual |
9 | Jacob Gorm Hansen, Eske Christiansen, Eric Jul |
Evil twins: two models for TCB reduction in HPC clusters. |
ACM SIGOPS Oper. Syst. Rev. |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Ram Dantu, João W. Cangussu, Sudeep Patwardhan |
Fast Worm Containment Using Feedback Control. |
IEEE Trans. Dependable Secur. Comput. |
2007 |
DBLP DOI BibTeX RDF |
general, network-level security and protection, Computer systems organization, computer systems organization, process control systems, special-purpose and application-based systems, communication/networking and information technology |
9 | Andrew G. Miklas, Kiran K. Gollu, Kelvin K. W. Chan, Stefan Saroiu, P. Krishna Gummadi, Eyal de Lara |
Exploiting Social Interactions in Mobile Systems. |
UbiComp |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Vukasin Pejovic, Slobodan Bojanic, Carlos Carreras |
Adding Value to TCP/IP Based Information exchange Security by Specialized Hardware. |
SECURWARE |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Davide Balzarotti, Marco Cova, Viktoria Felmetsger, Giovanni Vigna |
Multi-module vulnerability analysis of web-based applications. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
multi-step attacks, static analysis, web applications, dynamic analysis, vulnerability analysis |
9 | Collin Jackson, Adam Barth, Andrew Bortz, Weidong Shao, Dan Boneh |
Protecting browsers from dns rebinding attacks. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
spam, firewall, dns, same-origin policy, click fraud |
9 | Jeongseok Seo, Sung Deok Cha |
Masquerade detection based on SVM and sequence-based user commands profile. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
user commands profile, support vector machine (SVM), anomaly detection, masquerade detection |
9 | Lawrence Teo, Gail-Joon Ahn |
Managing heterogeneous network environments using an extensible policy framework. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Hannan Xiao, James A. Malcolm, Bruce Christianson, Ying Zhang 0020 |
Hierarchical Trustworthy Authentication for Pervasive Computing. |
MobiQuitous |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Rhiannon Weaver, M. Patrick Collins |
Fishing for phishes: applying capture-recapture methods to estimate phishing populations. |
eCrime Researchers Summit |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia |
Management of Exceptions on Access Control Policies. |
SEC |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Feng Cheng 0002, Christian Wolter, Christoph Meinel |
A Simple, Smart and Extensible Framework for Network Security Measurement. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Emanuel P. Freire, Ronaldo M. Salles, Artur Ziviani |
On Metrics to Distinguish Skype flows from HTTP traffic. |
LANOMS |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Henry Haverinen, Jonne Siren, Pasi Eronen |
Energy Consumption of Always-On Applications in WCDMA Networks. |
VTC Spring |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Tonio Triebel, Benjamin Guthier, Wolfgang Effelsberg |
Skype4Games. |
NETGAMES |
2007 |
DBLP DOI BibTeX RDF |
distributed interactive applications, peer-to-peer, Skype |
9 | Grzegorz J. Nalepa |
Application of the XTT Rule-Based Model for Formal Design and Verification of Internet Security Systems. |
SAFECOMP |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Simone Ferraresi, Stefano Pesic, Livia Trazza, Andrea Baiocchi |
Automatic Conflict Analysis and Resolution of Traffic Filtering Policy for Firewall and Security Gateway. |
ICC |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia |
Aggregating and Deploying Network Access Control Policies. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Eduardo B. Fernández |
Security patterns and secure systems design. |
ACM Southeast Regional Conference |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Sapon Tanachaiwiwat, Ahmed Helmy |
On the performance evaluation and prediction of encounter-based worm interactions based on node characteristics. |
Challenged Networks |
2007 |
DBLP DOI BibTeX RDF |
encounter-based worms, delay-tolerant networks, worm |
9 | Golnaz Elahi, Eric S. K. Yu |
A Goal Oriented Approach for Modeling and Analyzing Security Trade-Offs. |
ER |
2007 |
DBLP DOI BibTeX RDF |
Security Trade-offs, Goal Model Evaluation, Goal Modeling, Trade-off Analysis |
9 | Chwan-Hwa John Wu, Chun-Ching Andy Huang, J. David Irwin |
Using Identity-Based Privacy-Protected Access Control Filter (IPACF) to against denial of service attacks and protect user privacy. |
SpringSim (3) |
2007 |
DBLP BibTeX RDF |
privacy, network security, DDoS, wireless security |
9 | Vera Marinova-Boncheva |
Applying a data mining method for intrusion detection. |
CompSysTech |
2007 |
DBLP DOI BibTeX RDF |
data mining, classification tree, misuse detection |
9 | K. Sivakumar, K. Garg |
Constructing a "Common Cross Site Scripting Vulnerabilities Enumeration (CXE)" Using CWE and CVE. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
Secure code, PHP Vulnerabilities, CWE, CVE, Web Security, XSS |
9 | J. Mark Pullen |
Network educationware demonstration. |
ITiCSE |
2007 |
DBLP DOI BibTeX RDF |
internet distance education, accessibility, wider access |
9 | Gustavo Marfia, Claudio E. Palazzi, Giovanni Pau 0001, Mario Gerla, Medy Sanadidi, Marco Roccetti |
Balancing video on demand flows over links with heterogeneous delays. |
MobiMedia |
2007 |
DBLP DOI BibTeX RDF |
RTT-fairness, TCP, video on demand |
9 | Håvard Espeland, Carl Henrik Lunde, Håkon Kvale Stensland, Carsten Griwodz, Pål Halvorsen |
Transparent protocol translation for streaming. |
ACM Multimedia |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Arijit Ganguly, David Wolinsky, P. Oscar Boykin, Renato J. O. Figueiredo |
Decentralized Dynamic Host Configuration in Wide-Area Overlays of Virtual Workstations. |
IPDPS |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Almut Herzog, Nahid Shahmehri |
User help techniques for usable security. |
CHIMIT |
2007 |
DBLP DOI BibTeX RDF |
on-line help, safe staging, user help, usable security, social navigation, wizard |
9 | Tetsuo Imai, Hideaki Goto, Hideaki Sone |
A Policy-Based, Secure Access Control Mechanism for Network Roaming Infrastructures. |
SAINT Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Shervin Erfani |
Tutorial 4: Wireless and Wireline Security Management. |
ISCC |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Mohammed Anis Benelbahri, Adel Bouhoula |
Tuple Based Approach for Anomalies Detection within Firewall Filtering Rules. |
ISCC |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Julien Bourgeois, Abdoul Karim Ganame, Igor V. Kotenko, Alexander Ulanov |
Software Environment for Simulation and Evaluation of a Security Operation Center. |
IF&GIS |
2007 |
DBLP DOI BibTeX RDF |
Security modeling and simulation, intrusion detection, DDoS, infrastructure security |
9 | Paul Z. Kolano |
Mesh: secure, lightweight grid middleware using existing SSH infrastructure. |
SACMAT |
2007 |
DBLP DOI BibTeX RDF |
security, distributed systems, authentication, access control, middleware, grids, authorization, delegation, single sign-on, SSH |
9 | Jérôme François, Radu State, Olivier Festor |
Botnets for Scalable Management. |
DSOM |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Kathy Dang Nguyen, P. S. Thiagarajan, Weng-Fai Wong |
A UML-Based Design Framework for Time-Triggered Applications. |
RTSS |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Eduardo B. Fernández |
Security Patterns and Secure Systems Design. |
LADC |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Arunabha Mukhopadhyay, Binay Bhushan, Debashis Saha, Ambuj Mahanti |
E-Risk Management through Self Insurance: An Option Model. |
HICSS |
2007 |
DBLP DOI BibTeX RDF |
e-risk, option model, self-insurance, e-commerce, security breach |
9 | A. Vartak, S. Ahmad, K. N. Gopinath |
An Experimental Evaluation of Over-The-Air (OTA) Wireless Intrusion Prevention Techniques. |
COMSWARE |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Yudith Cardinale, Carlos Figueira |
GiPS: A Grid Portal for Executing Java Applications on Globus-Based Grids. |
ISPA |
2007 |
DBLP DOI BibTeX RDF |
Portal Development Kit, Java Execution Model, Grid Computing, Grid Security, Grid Portals |
9 | Vesselin Tzvetkov |
Fast detection of disconnection using adaptive Fuzzy Logic. |
ICNSC |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Jia Ni, Chuang Lin 0002, Zhen Chen 0001, Peter D. Ungsunan |
A Fast Multi-pattern Matching Algorithm for Deep Packet Inspection on a Network Processor. |
ICPP |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Harshawardhan Gadgil, Geoffrey C. Fox, Shrideep Pallickara, Marlon E. Pierce |
Scalable, fault-tolerant management in a service oriented architecture. |
HPDC |
2007 |
DBLP DOI BibTeX RDF |
service oriented achitecture, web services, fault-tolerance, scalable |
9 | Tarek Abbes, Adel Bouhoula, Michaël Rusinowitch |
A Traffic Classification Algorithm for Intrusion Detection. |
AINA Workshops (1) |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Vesselin Tzvetkov |
Optimization of update intervals in Dead-Peer-Detection using adaptive Fuzzy Logic. |
AINA |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Sourour Meharouech, Adel Bouhoula, Tarek Abbes |
A Stateful Real Time Intrusion Detection System for high-speed network. |
AINA |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Tiantian Qin, Judee K. Burgoon |
An Investigation of Heuristics of Human Judgment in Detecting Deception and Potential Implications in Countering Social Engineering. |
ISI |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Adel El-Atawy, Taghrid Samak, Zein Wali, Ehab Al-Shaer, Frank Lin, Christopher Pham, Sheng Li |
An Automated Framework for Validating Firewall Policy Enforcement. |
POLICY |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Sapon Tanachaiwiwat, Ahmed Helmy |
Computer worm ecology in encounter-based networks. |
BROADNETS |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Tong Liu, Chwan-Hwa John Wu |
Intrusion-resilient, DDoS-resistant and agent-assisted network security system. |
BROADNETS |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Seong Joon Lee, Il Seok Ko, Min Wook Kil |
A User Interface for Controlling Information Appliances in Smart Homes. |
KES-AMSTA |
2007 |
DBLP DOI BibTeX RDF |
|
9 | El-Sayed M. El-Alfy, Shokri Z. Selim |
On Optimal Firewall Rule Ordering. |
AICCSA |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Brandon Wagner, Stephen A. Renshaw, Kent Broadbent |
A multi-part lab exercise for analyzing the effect of peer-to-peer software on a university network. |
SIGITE Conference |
2007 |
DBLP DOI BibTeX RDF |
network traffic monitoring, networking lab, peer-to-peer, campus network |
9 | Ying Qiu, Feng Bao 0001, Jianying Zhou 0001 |
Firewall for Dynamic IP Address in Mobile IPv6. |
ICICS |
2007 |
DBLP DOI BibTeX RDF |
Mobile IP6, Firewall |
9 | Kirsti Simula |
Intelligent software agent framework for customized mobile services. |
Middleware (Doctoral Symposium) |
2007 |
DBLP DOI BibTeX RDF |
internet, mobile device, framework, software agents |
9 | Alex Wun, Hans-Arno Jacobsen |
A Policy Management Framework for Content-Based Publish/Subscribe Middleware. |
Middleware |
2007 |
DBLP DOI BibTeX RDF |
Security, Policy, Configurability, Publish/Subscribe |
9 | Genevieve Bartlett, John S. Heidemann, Christos Papadopoulos |
Understanding passive and active service discovery. |
Internet Measurement Conference |
2007 |
DBLP DOI BibTeX RDF |
network reconnaissance, service discovery, situational awareness, active measurement, passive monitoring |
9 | Mark Wallis, Frans Henskens, Michael Hannaford |
A System for Robust Peer-to-Peer Communication with Dynamic Protocol Selection. |
PDCAT |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Alain J. Mayer, Avishai Wool, Elisha Ziskind |
Offline firewall analysis. |
Int. J. Inf. Sec. |
2006 |
DBLP DOI BibTeX RDF |
Security anagment, Network Security, Internet Protocol (IP), Packet Filtering |
9 | P. Ramasubramanian, Arputharaj Kannan |
A genetic-algorithm based neural network short-term forecasting framework for database intrusion prediction system. |
Soft Comput. |
2006 |
DBLP DOI BibTeX RDF |
Database anomaly intrusion prediction, Genetic algorithms, Artificial neural networks, Database security, Intrusion prevention |
9 | Gunnar Peterson, John Steven |
Defining Misuse within the Development Process. |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
|
9 | José Carlos Brustoloni |
Laboratory experiments for network security instruction. |
ACM J. Educ. Resour. Comput. |
2006 |
DBLP DOI BibTeX RDF |
certifying authority, security, education, experiment, fingerprinting, Certificate, password, firewall, IPsec, VPN, SSL, dictionary attack, course, eavesdropping, SSH, port scanning, man-in-the-middle |
9 | Paul Brebner, Wolfgang Emmerich |
Two Ways to Grid: The Contribution of Open Grid Services Architecture (OGSA) Mechanisms to Service-Centric and Resource-Centric Lifecycles. |
J. Grid Comput. |
2006 |
DBLP DOI BibTeX RDF |
open Grid services architecture (OGSA) evaluation, service-oriented architecture (SOA) lifecycles |
9 | Hazem H. Hamed, Ehab Al-Shaer |
Dynamic rule-ordering optimization for high-speed firewall filtering. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Mario Petrone, Roberto Zarrelli |
Enabling PVM to Build Parallel Multidomain Virtual Machines. |
PDP |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Bee-Chung Chen, Vinod Yegneswaran, Paul Barford, Raghu Ramakrishnan 0001 |
Toward a Query Language for Network Attack Data. |
ICDE Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Dalila Boughaci, Habiba Drias, Brahim Oubeka, Abdelkader Aissioui, Belaid Benhamou |
A Distributed Firewall using Autonomous Agents. |
DepCoS-RELCOMEX |
2006 |
DBLP DOI BibTeX RDF |
|
9 | A. A. Azeezunnisa, T. Srinivasan 0001, D. Vijayalakshmi |
PAFBV: A Novel Parallel Aggregated and Folded Bit Vector Packet Classification Scheme for IPv6 Routers. |
CIT |
2006 |
DBLP DOI BibTeX RDF |
|
Displaying result #501 - #600 of 803 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ >>] |
|