Cyberspace Security and Defense: Research IssuesSpringer Science & Business Media |
Saturs
ComputerAided Tool Supporting Design and Evaluation | 3 |
A Case for Public and Private Review of Developing it Security Standards | 25 |
Assuring Critical Information Infrastructure | 43 |
Systemic Challenges for Critical Information Infrastructure Protection | 57 |
Decentralized Energy Supply to Secure Computer Systems | 75 |
Dependability | 99 |
Safety Analysis MethodsSoftware Development Questions | 101 |
Trust CaseA Case for Trustworthiness of it Infrastructures | 125 |
Early Warning Information Systems and Secure Access Control | 229 |
Foundations for the Development of Early Warning Information Systems | 231 |
IRIS Biometrics for Secure Remote Access | 259 |
New Directions in Access Control | 279 |
Cryptography | 295 |
Improved Block Cipher Counter Mode of Operation Schemes | 297 |
Electronic Signature in Real World | 315 |
A Note on Two Significant Developments in Cyberspace Security and Defense | 323 |
Dependability Structure and Infrastructure | 143 |
A Unified Approach | 161 |
Networks | 175 |
Design of Distributes Sensor Networks for Security and Defense | 177 |
A Distributed Approach to the Recognition of Geographically Located IP Devices | 193 |
Situational Awareness and Network Traffic Analysis | 209 |
331 | |
Intrusion Detection | 347 |
An Infrastructure for Distributed Event Acquisition | 349 |
Some Aspects of Neural Network Approach for Intrusion Detection | 367 |
Citi izdevumi - Skatīt visu
Cyberspace Security and Defense: Research Issues: Proceedings of the NATO ... Janusz S. Kowalik,Janusz Gorski,Anatoly Sachenko Ierobežota priekšskatīšana - 2005 |
Cyberspace Security and Defense: Research Issues: Proceedings of the NATO ... Janusz S. Kowalik,Janusz Gorski,Anatoly Sachenko Ierobežota priekšskatīšana - 2005 |
Bieži izmantoti vārdi un frāzes
access control activity algorithm analysis application approach assessment attack attributes biometric block cipher certificate certification authority Common Criteria communication complex components connection considered Counter mode critical information infrastructure Cyberspace Security database decryption defined dependability distributed electronic signature embedded systems encryption energy environment evaluation event example failure mode fault Figure function honeypot host identified IEEE implemented information systems interaction International Internet intrusion detection IP address iris image iris recognition issues known plaintext attacks method mobile agent module NetFlow neural networks nodes operation organization output packets plaintext port problem protection protocol remote result risk safety scale-free networks secret key Security and Defense security objectives security requirements sensor networks server solar Source specific stakeholders standard step weight stream cipher structure Table target tcpdump threats tool traffic trough concentrator trust objective users vulnerability