Melden Sie sich zuerst an, um alle Funktionen optimal nutzen zu können!
A comparative analysis of detection metrics for covert timing channels (Englisch)
- Neue Suche nach: Archibald, Rennie
- Neue Suche nach: Ghosal, Dipak
- Neue Suche nach: Archibald, Rennie
- Neue Suche nach: Ghosal, Dipak
In:
Computers & Security
;
45
;
284-292
;
2014
-
ISSN:
- Aufsatz (Zeitschrift) / Print
-
Titel:A comparative analysis of detection metrics for covert timing channels
-
Beteiligte:Archibald, Rennie (Autor:in) / Ghosal, Dipak (Autor:in)
-
Erschienen in:Computers & Security ; 45 ; 284-292
-
Verlag:
-
Erscheinungsdatum:2014
-
Format / Umfang:9 Seiten, 21 Quellen
-
ISSN:
-
Coden:
-
DOI:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis – Band 45
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Taxonomy of intrusion risk assessment and response systemShameli-Sendi, Alireza / Cheriet, Mohamed / Hamou-Lhadj, Abdelwahab et al. | 2014
- 17
-
Uniform DoS tracebackAlenezi, Mohammed N. / Reed, Martin J. et al. | 2014
- 27
-
An approach for profiling phishing activitiesHamid, Isredza Rahmi A. / Abawajy, Jemal H. et al. | 2014
- 42
-
Information security incident management: Current practice as reported in the literatureTøndel, Inger Anne / Line, Maria B. / Jaatun, Martin Gilje et al. | 2014
- 58
-
A multi-level approach to understanding the impact of cyber crime on the financial sectorLagazio, Monica / Sherif, Nazneen / Cushman, Mike et al. | 2014
- 75
-
Bluetooth Command and Control channelPieterse, Heloise / Olivier, Martin S. et al. | 2014
- 84
-
On the security of text-based 3D CAPTCHAsNguyen, Vu Duc / Chow, Yang-Wai / Susilo, Willy et al. | 2014
- 100
-
An empirical comparison of botnet detection methodsGarcía, S. / Grill, M. / Stiborek, J. / Zunino, A. et al. | 2014
- 124
-
Ontology for attack detection: An intelligent approach to web application securityRazzaq, Abdul / Anwar, Zahid / Ahmad, H. Farooq / Latif, Khalid / Munir, Faisal et al. | 2014
- 147
-
Soft biometrics for keystroke dynamics: Profiling individuals while typing passwordsSyed Idrus, Syed Zulkarnain / Cherrier, Estelle / Rosenberger, Christophe / Bours, Patrick et al. | 2014
- 156
-
Performance evaluation of anomaly-detection algorithms for mouse dynamicsShen, Chao / Cai, Zhongmin / Guan, Xiaohong / Maxion, Roy et al. | 2014
- 172
-
Complexity is dead, long live complexity! How software can help service providers manage security and complianceThalmann, Stefan / Bachlechner, Daniel / Demetz, Lukas / Manhart, Markus et al. | 2014
- 186
-
A practical solution for sealed bid and multi-currency auctionsMontenegro, Jose A. / Lopez, Javier et al. | 2014
- 199
-
Location leakage in distance bounding: Why location privacy does not workMitrokotsa, Aikaterini / Onete, Cristina / Vaudenay, Serge et al. | 2014
- 210
-
Towards optimal noise distribution for privacy preserving in data aggregationZhang, Hao / Yu, Nenghai / Wen, Yonggang / Zhang, Weiming et al. | 2014
- 231
-
Selection of Candidate Support Vectors in incremental SVM for network intrusion detectionChitrakar, Roshan / Huang, Chuanhe et al. | 2014
- 242
-
HTTP attack detection using n-gram analysisOza, Aditya / Ross, Kevin / Low, Richard M. / Stamp, Mark et al. | 2014
- 255
-
Design guidelines for security protocols to prevent replay & parallel session attacksJurcut, Anca D. / Coffey, Tom / Dojen, Reiner et al. | 2014
- 274
-
Shadow IT – A view from behind the curtainSilic, Mario / Back, Andrea et al. | 2014
- 284
-
A comparative analysis of detection metrics for covert timing channelsArchibald, Rennie / Ghosal, Dipak et al. | 2014
- 293
-
Time and space interval record schedule consistency analysis for atomic items without interactions in open spaces with stationary locationsCohen, Fred / Cohen, Don et al. | 2014
- 305
-
Securing cloud and mobility: A practitioner's guideTsalis, Nikolaos / Gritzalis, Dimitris et al. | 2014
- IFC
-
Editorial Board| 2014
- iii
-
Contents| 2014