A Framework for Monitoring SIP Enterprise Networks
Nassar, M, State, R, Festor, O
Published in 2010 Fourth International Conference on Network and System Security (01.09.2010)
Published in 2010 Fourth International Conference on Network and System Security (01.09.2010)
Get full text
Conference Proceeding
Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network
Chaabane, A, Manils, P, Kaafar, M A
Published in 2010 Fourth International Conference on Network and System Security (01.09.2010)
Published in 2010 Fourth International Conference on Network and System Security (01.09.2010)
Get full text
Conference Proceeding
RF-DNA Fingerprinting for Airport WiMax Communications Security
Williams, M D, Munns, S A, Temple, M A, Mendenhall, M J
Published in 2010 Fourth International Conference on Network and System Security (01.09.2010)
Published in 2010 Fourth International Conference on Network and System Security (01.09.2010)
Get full text
Conference Proceeding
Trust-Involved Access Control in Collaborative Open Social Networks
Hua Wang, Lili Sun
Published in 2010 Fourth International Conference on Network and System Security (01.09.2010)
Published in 2010 Fourth International Conference on Network and System Security (01.09.2010)
Get full text
Conference Proceeding
Password Entropy and Password Quality
Wanli Ma, Campbell, J, Tran, D, Kleeman, D
Published in 2010 Fourth International Conference on Network and System Security (01.09.2010)
Published in 2010 Fourth International Conference on Network and System Security (01.09.2010)
Get full text
Conference Proceeding
CALD: Surviving Various Application-Layer DDoS Attacks That Mimic Flash Crowd
Sheng Wen, Weijia Jia, Wei Zhou, Wanlei Zhou, Chuan Xu
Published in 2010 Fourth International Conference on Network and System Security (01.09.2010)
Published in 2010 Fourth International Conference on Network and System Security (01.09.2010)
Get full text
Conference Proceeding
Adaptive Clustering with Feature Ranking for DDoS Attacks Detection
Lifang Zi, Yearwood, J, Xin-Wen Wu
Published in 2010 Fourth International Conference on Network and System Security (01.09.2010)
Published in 2010 Fourth International Conference on Network and System Security (01.09.2010)
Get full text
Conference Proceeding
A Flexible and Efficient Alert Correlation Platform for Distributed IDS
Roschke, S, Feng Cheng, Meinel, C
Published in 2010 Fourth International Conference on Network and System Security (01.09.2010)
Published in 2010 Fourth International Conference on Network and System Security (01.09.2010)
Get full text
Conference Proceeding
Risk-Aware Framework for Activating and Deactivating Policy-Based Response
Kanoun, W, Cuppens-Boulahia, N, Cuppens, F, Dubus, S
Published in 2010 Fourth International Conference on Network and System Security (01.09.2010)
Published in 2010 Fourth International Conference on Network and System Security (01.09.2010)
Get full text
Conference Proceeding
Digital Video Tamper Detection Based on Multimodal Fusion of Residue Features
Chetty, Girija, Biswas, Monica, Singh, Rashmi
Published in 2010 Fourth International Conference on Network and System Security (01.09.2010)
Published in 2010 Fourth International Conference on Network and System Security (01.09.2010)
Get full text
Conference Proceeding
Dynamic Trust Model for Federated Identity Management
Hao Gao, Jun Yan, Yi Mu
Published in 2010 Fourth International Conference on Network and System Security (01.09.2010)
Published in 2010 Fourth International Conference on Network and System Security (01.09.2010)
Get full text
Conference Proceeding
Business Process-Based Information Security Risk Assessment
Khanmohammadi, K, Houmb, S H
Published in 2010 Fourth International Conference on Network and System Security (01.09.2010)
Published in 2010 Fourth International Conference on Network and System Security (01.09.2010)
Get full text
Conference Proceeding
Analysis of Credential Stealing Attacks in an Open Networked Environment
Sharma, A, Kalbarczyk, Z, Iyer, R, Barlow, J
Published in 2010 Fourth International Conference on Network and System Security (01.09.2010)
Published in 2010 Fourth International Conference on Network and System Security (01.09.2010)
Get full text
Conference Proceeding
Validating Denial of Service Vulnerabilities in Web Services
Suriadi, S, Clark, A, Schmidt, D
Published in 2010 Fourth International Conference on Network and System Security (01.09.2010)
Published in 2010 Fourth International Conference on Network and System Security (01.09.2010)
Get full text
Conference Proceeding
DIPLOMA: Distributed Policy Enforcement Architecture for MANETs
Alicherry, M, Keromytis, A D
Published in 2010 Fourth International Conference on Network and System Security (01.09.2010)
Published in 2010 Fourth International Conference on Network and System Security (01.09.2010)
Get full text
Conference Proceeding
A Node-based Trust Management Scheme for Mobile Ad-Hoc Networks
Ferdous, R, Muthukkumarasamy, V, Sattar, A
Published in 2010 Fourth International Conference on Network and System Security (01.09.2010)
Published in 2010 Fourth International Conference on Network and System Security (01.09.2010)
Get full text
Conference Proceeding
The Mobile Phone as a Multi OTP Device Using Trusted Computing
Alzomai, M, Jøsang, Audun
Published in 2010 Fourth International Conference on Network and System Security (01.09.2010)
Published in 2010 Fourth International Conference on Network and System Security (01.09.2010)
Get full text
Conference Proceeding
Message from the NSS 2010 General Chairs
Published in 2010 Fourth International Conference on Network and System Security
(01.09.2010)
Get full text
Conference Proceeding
Message from the NSS 2010 Program Chairs
Published in 2010 Fourth International Conference on Network and System Security
(01.09.2010)
Get full text
Conference Proceeding