A systematic approach to network security assessment (English)
- New search for: Rasti, Mehdi
- New search for: Sarramy, Davood
- New search for: Khaleghi, Mahmood
- New search for: Rasti, Mehdi
- New search for: Sarramy, Davood
- New search for: Khaleghi, Mahmood
In:
International Conference on Computer Applications in Industry and Engineering, 17
;
79-84
;
2004
-
ISBN:
- Conference paper / Print
-
Title:A systematic approach to network security assessment
-
Additional title:Ein systematisches Verfahren zur Bewertung der Netzwerksicherheit
-
Contributors:
-
Published in:
-
Publisher:
-
Place of publication:Cary
-
Publication date:2004
-
Size:6 Seiten, 1 Bild, 1 Tabelle, 13 Quellen
-
ISBN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Computer Immunology and Neural Network Models for Masquerader DetectionYu, Y. / Graham, J. H. / International Society for Computers and Their Applications et al. | 2004
- 7
-
Multivariate-based Data Reduction for Pattern RecognitionNam, D. H. / Singh, H. / International Society for Computers and Their Applications et al. | 2004
- 13
-
Tuning an Adaptive Neural Network Fuzzy Inference Controller Using Evolutionary LearningKothari, J. / Grant, E. / Lee, G. K. / International Society for Computers and Their Applications et al. | 2004
- 17
-
Adjusting Web Caching Computers to Reduce Communication Channel AllocationZuck, R. / Williams, A. / Kair, B. / Bui, H. / Stringfellow, C. / Passos, N. / International Society for Computers and Their Applications et al. | 2004
- 21
-
QoS Provisioning in Wireless Cellular Networks for Multimedia ApplicationsAl-Sharaeh, S. H. / Garba, I. / International Society for Computers and Their Applications et al. | 2004
- 25
-
Coupling On-line Game Implementation and Problem Solving: A Very Viable ApproachRosiene, J. A. / Rosiene, C. P. / International Society for Computers and Their Applications et al. | 2004
- 30
-
Self-Resonant Frequency of Passive Chip ComponentsAkambi, A. S. / Johnson, B. P. / International Society for Computers and Their Applications et al. | 2004
- 34
-
A PID Controller for Real-Time DC Motor Speed Control using the C505C MicrocontrollerKamalasadan, S. / Hande, A. / International Society for Computers and Their Applications et al. | 2004
- 40
-
Run-ahead Crash Recovery for Shared Virtual Memory SystemsKongmunvattana, A. / International Society for Computers and Their Applications et al. | 2004
- 46
-
Automated Error-Prevention and Error-Detection Tools for Assembly LanguageJohnson, L. G. / Pheanis, D. C. / International Society for Computers and Their Applications et al. | 2004
- 51
-
Optimum Retiming Of Multi-Dimensional Data Flow Graphs With Variable Processing OrderVerma, R. / Peng, D. / International Society for Computers and Their Applications et al. | 2004
- 57
-
A Common Interval Searching Algorithm for Protein Sequence ComparisonHuang, X. / Ali, H. H. / International Society for Computers and Their Applications et al. | 2004
- 63
-
A Scheme for the Segmentation of Text and Image Areas in Compound Documents for Efficient CompressionSubramanya, S. R. / International Society for Computers and Their Applications et al. | 2004
- 67
-
Multicasting Secret Images using a Knapsack-like Cipher SystemWang, S.-J. / International Society for Computers and Their Applications et al. | 2004
- 73
-
Security Considerations in DNP3 SCADA SystemsPatel, S. C. / Graham, J. H. / International Society for Computers and Their Applications et al. | 2004
- 79
-
A Systematic Approach to Network Security AssessmentRasti, M. / Sarramy, D. / Khaleghi, M. / International Society for Computers and Their Applications et al. | 2004
- 85
-
Design and Implementation of AES (Rijndael) AlgorithmParikh, C. / Patel, P. / International Society for Computers and Their Applications et al. | 2004
- 90
-
Analyzing Early Requirements in an E-Commerce System with a Goal and Agent Oriented ApproachLiu, Z. / International Society for Computers and Their Applications et al. | 2004
- 96
-
Knowledge Discovery in Schizophrenia using Association RulesOuali, A. / Ramdane-Cherif, A. / Levy, N. / Krebs, M. O. / International Society for Computers and Their Applications et al. | 2004
- 103
-
Online Voting System for Student Body ElectionShanmugasundaram, V. / Juell, P. / Vanderschoot, H. / Tschakert, C. / International Society for Computers and Their Applications et al. | 2004
- 109
-
An Architecture for a Hardware Implementation of the OSPF ProtocolAbou-Gabal, M. / Peterkin, R. / Ionescu, D. / International Society for Computers and Their Applications et al. | 2004
- 115
-
Architecture for Context-driven Packet Payload Processing EngineVora, S. N. / Patel, P. / International Society for Computers and Their Applications et al. | 2004
- 120
-
Adaptive Data Forwarding Techniques for Energy Conservation in Wireless Sensor NetworksGundappachikkenahalli, K. / Ali, H. H. / International Society for Computers and Their Applications et al. | 2004
- 126
-
Reducing Communication Overhead in 3D Mesh Networks for Unicast and Path-based Multiple MulticastsSurma, D. R. / International Society for Computers and Their Applications et al. | 2004
- 132
-
A Novel Approach for Improving QoS Using Genetic Optimization AlgorithmSalem, A. H. / Elmaghraby, A. S. / Kumar, A. / Ragade, R. K. / International Society for Computers and Their Applications et al. | 2004
- 138
-
Prototyped Embedded Application for IGMP Version 2 ProtocolMistry, A. / Patel, P. / International Society for Computers and Their Applications et al. | 2004
- 143
-
Block Identification for Reducing Blocking Artefact in MPEG-1 Video Coded Images Using Statistical Inference and Performance Measurement Using Block Impairment Metric (BIM)Chowdhury, M. U. / Ray, S. / Pham, T. / International Society for Computers and Their Applications et al. | 2004
- 148
-
Implementation of the DFT Using Radix-2 and Paired Transform AlgorithmsRanganadh, N. / Patel, P. / Grigoryan, A. M. / International Society for Computers and Their Applications et al. | 2004
- 154
-
Invisible Digital Watermarking of Remotely Sensed Satellite Images - A New ApproachKrebsbach, S. / Perrizo, W. / International Society for Computers and Their Applications et al. | 2004
- 160
-
A Distance-based Outlier Detection Method Using P-TreeRen, D. / Scott, K. / Wang, B. / Perrizo, W. / International Society for Computers and Their Applications et al. | 2004
- 165
-
A P-Tree based Outlier Detection MethodRen, D. / Wang, B. / Perrizo, W. / International Society for Computers and Their Applications et al. | 2004
- 171
-
A New Fast Fault Tolerant Scheduling Approach in Distributed SystemsDesiraju, M. / Ali, H. H. / International Society for Computers and Their Applications et al. | 2004
- 177
-
A Cluster-based Outlier Detection Method without Pre-ClusteringRen, D. / Wang, B. / Perrizo, W. / International Society for Computers and Their Applications et al. | 2004
- 181
-
Parameter Reduction for Density-based Clustering on Large Data SetsWang, B. / Perrizo, W. / International Society for Computers and Their Applications et al. | 2004
- 187
-
Task Scheduling Algorithm with Duplication for Distributed ComputingPasham, S. / Lin, W.-M. / International Society for Computers and Their Applications et al. | 2004
- 193
-
Web Access Clustering using Tolerance RelationSun, F.-S. / Tzeng, C.-H. / International Society for Computers and Their Applications et al. | 2004