skip to main content
Resultados 1 2 3 4 5 next page
Mostrar Somente
Refinado por: tipo de recurso: Anais de Congresso remover
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Learning Unknown Attacks — A Start
Material Type:
Ata de Congresso
Adicionar ao Meu Espaço

Learning Unknown Attacks — A Start

Just, James E. ; Reynolds, James C. ; Clough, Larry A. ; Danforth, Melissa ; Levitt, Karl N. ; Maglich, Ryan ; Rowe, Jeff

Lecture notes in computer science, 2002, p.158-176 [Periódico revisado por pares]

Berlin, Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

2
Hypercalcaemia and bony lesions in association with parathyroid and prostatic carcinoma
Material Type:
Ata de Congresso
Adicionar ao Meu Espaço

Hypercalcaemia and bony lesions in association with parathyroid and prostatic carcinoma

KAPLAN, F. J. L ; FATAAR, A. B ; LEVITT, N. S

JEMDSA, 2001, Vol.6 (1), p.6-8 [Periódico revisado por pares]

Pinelands: Health and Medical Publishing Group

Sem texto completo

3
Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks
Material Type:
Ata de Congresso
Adicionar ao Meu Espaço

Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks

Song, Tao ; Ko, Calvin ; Tseng, Chinyang Henry ; Balasubramanyam, Poornima ; Chaudhary, Anant ; Levitt, Karl N.

Formal Aspects in Security and Trust, 2006, p.16-33 [Periódico revisado por pares]

Berlin, Heidelberg: Springer Berlin Heidelberg

Sem texto completo

4
A formal-specification based approach for protecting the domain name system
Material Type:
Ata de Congresso
Adicionar ao Meu Espaço

A formal-specification based approach for protecting the domain name system

Cheung, S. ; Levitt, K.N.

Proceeding International Conference on Dependable Systems and Networks. DSN 2000, 2000, p.641-651

Los Alamitos CA: IEEE

Texto completo disponível

5
Design and Implementation of FAITH, An Experimental System to Intercept and Manipulate Online Social Informatics
Material Type:
Ata de Congresso
Adicionar ao Meu Espaço

Design and Implementation of FAITH, An Experimental System to Intercept and Manipulate Online Social Informatics

Ruaylong Lee ; Nia, R. ; Hsu, J. ; Levitt, K. N. ; Rowe, J. ; Wu, S. F. ; Shaozhi Ye

2011 International Conference on Advances in Social Networks Analysis and Mining, 2011, p.195-202

IEEE

Texto completo disponível

6
A distributed host-based worm detection system
Material Type:
Ata de Congresso
Adicionar ao Meu Espaço

A distributed host-based worm detection system

Cheetancheri, Senthilkumar ; Agosta, John ; Dash, Denver ; Levitt, Karl ; Rowe, Jeff ; Schooler, Eve

Applications, Technologies, Architectures, and Protocols for Computer Communication: Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense; 11-15 Sept. 2006, 2006, p.107-113

ACM

Texto completo disponível

7
Cost Sensitive Moving Target Consensus
Material Type:
Ata de Congresso
Adicionar ao Meu Espaço

Cost Sensitive Moving Target Consensus

Duan, Sisi ; Li, Yun ; Levitt, Karl N.

United States 2016

Sem texto completo

8
Protecting routing infrastructures from denial of service using cooperative intrusion detection
Material Type:
Ata de Congresso
Adicionar ao Meu Espaço

Protecting routing infrastructures from denial of service using cooperative intrusion detection

Cheung, Steven ; Levitt, Karl

New Security Paradigms Workshop: Proceedings of the 1997 workshop on New security paradigms; 23-26 Sept. 1997, 1998, p.94-106

ACM

Texto completo disponível

9
Data level inference detection in database systems
Material Type:
Ata de Congresso
Adicionar ao Meu Espaço

Data level inference detection in database systems

Yip, R.W. ; Levitt, E.N.

Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238), 1998, p.179-189

IEEE

Texto completo disponível

10
Proving multilevel security of a system design
Material Type:
Ata de Congresso
Adicionar ao Meu Espaço

Proving multilevel security of a system design

Feiertag, R J ; Levitt, K N ; Robinson, L

Operating Systems Review, 1977, p.57-65

Texto completo disponível

Resultados 1 2 3 4 5 next page

Personalize Seus Resultados

  1. Editar

Refine Search Results

Expandir Meus Resultados

  1.   

Mostrar Somente

  1. Recursos Online (26)
  2. Revistas revisadas por pares (11)

Data de Publicação 

De até
  1. Antes de1981  (6)
  2. 1981Até1990  (14)
  3. 1991Até1999  (13)
  4. 2000Até2006  (10)
  5. Após 2006  (8)
  6. Mais opções open sub menu

Idioma 

  1. Inglês  (48)
  2. Francês  (1)
  3. Mais opções open sub menu

Buscando em bases de dados remotas. Favor aguardar.