A Distributed Denial of Service Testbed (Englisch)
- Neue Suche nach: Schmidt, D.
- Neue Suche nach: Suriadi, S.
- Neue Suche nach: Tickle, A.
- Neue Suche nach: Clark, A.
- Neue Suche nach: Mohay, G.
- Neue Suche nach: Ahmed, E.
- Neue Suche nach: Mackie, J.
- Neue Suche nach: Schmidt, D.
- Neue Suche nach: Suriadi, S.
- Neue Suche nach: Tickle, A.
- Neue Suche nach: Clark, A.
- Neue Suche nach: Mohay, G.
- Neue Suche nach: Ahmed, E.
- Neue Suche nach: Mackie, J.
- Neue Suche nach: Berleur, J.
- Neue Suche nach: Hercheui, M.D.
- Neue Suche nach: Hilty, L.M.
In:
Human choice and computers; What kind of information society? governance, virtuality, surveillance, sustainability, resilience
328
;
338-349
;
2010
-
ISBN:
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:A Distributed Denial of Service Testbed
-
Beteiligte:Schmidt, D. ( Autor:in ) / Suriadi, S. ( Autor:in ) / Tickle, A. ( Autor:in ) / Clark, A. ( Autor:in ) / Mohay, G. ( Autor:in ) / Ahmed, E. ( Autor:in ) / Mackie, J. ( Autor:in ) / Berleur, J. / Hercheui, M.D. / Hilty, L.M.
-
Kongress:International conference; 9th, Human choice and computers; What kind of information society? governance, virtuality, surveillance, sustainability, resilience ; 2010 ; Brisbane, Australia
-
Erschienen in:
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Berlin
-
Erscheinungsdatum:01.01.2010
-
Format / Umfang:12 pages
-
Anmerkungen:Includes bibliographical references and author index
-
ISBN:
-
ISSN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
What Kind of Information Society? Introduction to the HCC9 Conference ProceedingsBerleur, J. / Hercheui, M.D. / Hilty, L.M. et al. | 2010
- 13
-
Ethics and ICT GovernanceBerleur, J. / Whitehouse, D. / Goujon, P. / Flick, C. et al. | 2010
- 22
-
The Demograhic Factors Affecting University Students' Intention to Pirate SoftwareSpark, L. et al. | 2010
- 33
-
ICT Governance versus Community Empowerment: Grassroots Evidence from BangladeshRahman, M. et al. | 2010
- 51
-
Exploring Digital Divide in the MaldivesShareef, M. / Ojo, A. / Janowski, T. et al. | 2010
- 64
-
Balancing Public and Private Interests in ICT Standardisation: The Case of AVS in ChinaSu, J. / Fomin, V.V. et al. | 2010
- 73
-
The European VCD System: Facilitating Public Procurement through Criteria-to-Evidence MappingMondorf, A. / Wimmer, M.A. et al. | 2010
- 86
-
Money Laundering and FATF Compliance by the International CommunityAlkaabi, A. / Mohay, G. / McCullagh, A. / Chantler, N. et al. | 2010
- 98
-
Ethical Governance for Emerging ICT: Opening Cognitive Framing and Achieving ReflexivityGoujon, P. / Flick, C. et al. | 2010
- 115
-
Virtual Technologies and Social ShapingKreps, D. et al. | 2010
- 118
-
Making a Good (Virtual) First Impression: The Use of Visuals in Online Impression Management and Creating Identity PerformancesPearson, E. et al. | 2010
- 131
-
Virtuality Improves the Well Being of Seniors through Increasing Social InteractionBurmeister, O.K. et al. | 2010
- 142
-
The Tragedy of the Virtual Commons as Manifested in the Death of BlogsLenarcic, J. / Sarkar, P. et al. | 2010
- 150
-
How to Measure Public Opinion in the Networked Age: Working in a Googleocracy or a Googlearchy?Westwood, S.J. et al. | 2010
- 161
-
A Multidiscipline Approach to Governing Virtual Property Theft in Virtual WorldsPatterson, N.C. / Hobbs, M. et al. | 2010
- 175
-
Surveillance and PrivacyGeorgiadou, Y. / Fischer-Hubner, S. et al. | 2010
- 178
-
Trends of Privacy and Surveillance in the Information Society (Extended Abstract)Brunnstein, K. et al. | 2010
- 180
-
Civil Society Must Publish Standards DocumentsClarke, R. et al. | 2010
- 185
-
Citizen Surveillance of the State: A Mirror for eGovernment?Verplanke, J. / Martinez, J. / Miscione, G. / Georgiadou, Y. / Coleman, D. / Hassan, A.A. et al. | 2010
- 202
-
Privacy Enhanced Fraud Resistant Road Pricing (Extended Abstract)Hoepman, J.-H. / Huitema, G. et al. | 2010
- 214
-
Privacy in Distributed Commercial ApplicationsKuntze, N. / Rudolph, C. et al. | 2010
- 227
-
ICT and Sustainable DevelopmentHilty, L.M. / Hercheui, M.D. et al. | 2010
- 236
-
ICT and the Environment in Developing Countries: A Review of Opportunities and DevelopmentsHoughton, J.W. et al. | 2010
- 248
-
A Model and Selected Instances of Green and Sustainable SoftwareDick, M. / Naumann, S. / Kuhn, N. et al. | 2010
- 260
-
Managing Energy Efficiency in Manufacturing Processes - Implementing Energy Performance in Production Information Technology SystemsBunse, K. / Vodicka, M. et al. | 2010
- 269
-
A Reference Process to Design Information Systems for Sustainable Design Based on LCA, PSS, Social and Economic AspectsSantana, F.S. / Barberato, C. / Saraiva, A.M. et al. | 2010
- 281
-
IT Support for Sustainable Development in OrganizationsMoeller, A. / Rolf, A. et al. | 2010
- 292
-
Utilising the Internet to Improve Peasant Artisan Incomes: Evidence from MexicoDobson, J. / Duncombe, R. / Nicholson, B. et al. | 2010
- 313
-
Society - Totally Dependent Upon ICT? Introduction to the CIP 2010 Conference ProceedingsCaelli, W. et al. | 2010
- 315
-
C-SAW: Critical Information Infrastructure Protection through SimplificationEllefsen, I. / von Solms, S. et al. | 2010
- 326
-
On Planning of FTTH Access Networks with and without RedundancyRiaz, M.T. / Haraldsson, G.H. / Lopaz, J.G. / Pedersen, J.M. / Madsen, O.B. et al. | 2010
- 338
-
A Distributed Denial of Service TestbedSchmidt, D. / Suriadi, S. / Tickle, A. / Clark, A. / Mohay, G. / Ahmed, E. / Mackie, J. et al. | 2010
- 350
-
Discrete Event Simulation of QoS of a SCADA System Interconnecting a Power Grid and a Telco NetworkCiancamerla, E. / Foglietta, C. / Lefevre, D. / Minichino, M. / Lev, L. / Shneck, Y. et al. | 2010
- 363
-
Critical Infrastructure Protection Risk Modelling with Games TechnologyMasek, M. / Boeing, A. / Bailey, W. et al. | 2010
- 373
-
Wireless Sensor Networks for the Protection of an Electrical Energy Distribution InfrastructureGrilo, A. / Casaca, A. / Nunes, M. / Fortunato, C. et al. | 2010
- 384
-
Risk Modelling the Transition of SCADA System to IPv6Suriadi, S. / Tickle, A. / Ahmed, E. / Smith, J. / Morarji, H. et al. | 2010