Network Security archive最新文献

筛选
英文 中文
Shields Up: Shields Up! Protecting browsers, endpoints and enterprises against web-based attacks 举起盾牌:举起盾牌!保护浏览器、终端和企业免受基于web的攻击
Network Security archive Pub Date : 2009-10-01 DOI: 10.1016/S1353-4858(09)70108-4
N. Lowe
{"title":"Shields Up: Shields Up! Protecting browsers, endpoints and enterprises against web-based attacks","authors":"N. Lowe","doi":"10.1016/S1353-4858(09)70108-4","DOIUrl":"https://doi.org/10.1016/S1353-4858(09)70108-4","url":null,"abstract":"","PeriodicalId":120600,"journal":{"name":"Network Security archive","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120392829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Intrusion Detection: Towards scalable intrusion detection 入侵检测:迈向可扩展的入侵检测
Network Security archive Pub Date : 2009-06-01 DOI: 10.1016/S1353-4858(09)70064-9
S. Shaikh, Howard Chivers, P. Nobles, J. A. Clark, Hao Chen
{"title":"Intrusion Detection: Towards scalable intrusion detection","authors":"S. Shaikh, Howard Chivers, P. Nobles, J. A. Clark, Hao Chen","doi":"10.1016/S1353-4858(09)70064-9","DOIUrl":"https://doi.org/10.1016/S1353-4858(09)70064-9","url":null,"abstract":"","PeriodicalId":120600,"journal":{"name":"Network Security archive","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"118338222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Virtualisation: Real security for virtual machines 虚拟化:虚拟机的真正安全
Network Security archive Pub Date : 2009-04-01 DOI: 10.1016/S1353-4858(09)70041-8
Ulf T. Mattsson
{"title":"Virtualisation: Real security for virtual machines","authors":"Ulf T. Mattsson","doi":"10.1016/S1353-4858(09)70041-8","DOIUrl":"https://doi.org/10.1016/S1353-4858(09)70041-8","url":null,"abstract":"","PeriodicalId":120600,"journal":{"name":"Network Security archive","volume":"110 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117437812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Kido: Here's looking at you Kido 木户:我来看看你,木户
Network Security archive Pub Date : 2009-03-01 DOI: 10.1016/S1353-4858(09)70026-1
Vitaly Kamluk
{"title":"Kido: Here's looking at you Kido","authors":"Vitaly Kamluk","doi":"10.1016/S1353-4858(09)70026-1","DOIUrl":"https://doi.org/10.1016/S1353-4858(09)70026-1","url":null,"abstract":"","PeriodicalId":120600,"journal":{"name":"Network Security archive","volume":"160 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117539246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MD5: The death of MD5 MD5: MD5失效
Network Security archive Pub Date : 2009-02-01 DOI: 10.1016/S1353-4858(09)70020-0
Dario V. Forte
{"title":"MD5: The death of MD5","authors":"Dario V. Forte","doi":"10.1016/S1353-4858(09)70020-0","DOIUrl":"https://doi.org/10.1016/S1353-4858(09)70020-0","url":null,"abstract":"","PeriodicalId":120600,"journal":{"name":"Network Security archive","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120711577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
TPMS: Strengthening enterprise applications using trusted platform modules TPMS:使用可信平台模块加强企业应用程序
Network Security archive Pub Date : 2008-06-01 DOI: 10.1016/S1353-4858(08)70078-3
T. Hardjono
{"title":"TPMS: Strengthening enterprise applications using trusted platform modules","authors":"T. Hardjono","doi":"10.1016/S1353-4858(08)70078-3","DOIUrl":"https://doi.org/10.1016/S1353-4858(08)70078-3","url":null,"abstract":"","PeriodicalId":120600,"journal":{"name":"Network Security archive","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120412861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Metrics: IT security metrics: implementation and standards compliance 度量:IT安全度量:实现和标准遵从性
Network Security archive Pub Date : 2008-06-01 DOI: 10.1016/S1353-4858(08)70075-8
J. Frankland
{"title":"Metrics: IT security metrics: implementation and standards compliance","authors":"J. Frankland","doi":"10.1016/S1353-4858(08)70075-8","DOIUrl":"https://doi.org/10.1016/S1353-4858(08)70075-8","url":null,"abstract":"","PeriodicalId":120600,"journal":{"name":"Network Security archive","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"118220793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Board's Role: Executive and board roles in information security 董事会的角色:信息安全的执行和董事会角色
Network Security archive Pub Date : 2007-08-01 DOI: 10.1016/S1353-4858(07)70073-9
P. Williams
{"title":"The Board's Role: Executive and board roles in information security","authors":"P. Williams","doi":"10.1016/S1353-4858(07)70073-9","DOIUrl":"https://doi.org/10.1016/S1353-4858(07)70073-9","url":null,"abstract":"","PeriodicalId":120600,"journal":{"name":"Network Security archive","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"118977769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
2FA: Selecting a two-factor authentication system 2FA:选择双因素身份验证系统
Network Security archive Pub Date : 2007-07-01 DOI: 10.1016/S1353-4858(07)70066-1
Duncan de Borde
{"title":"2FA: Selecting a two-factor authentication system","authors":"Duncan de Borde","doi":"10.1016/S1353-4858(07)70066-1","DOIUrl":"https://doi.org/10.1016/S1353-4858(07)70066-1","url":null,"abstract":"","PeriodicalId":120600,"journal":{"name":"Network Security archive","volume":"244 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117988377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Metadata: Document metadata, tracking and tracing 元数据:文档元数据,跟踪和跟踪
Network Security archive Pub Date : 2007-07-01 DOI: 10.1016/S1353-4858(07)70062-4
A. J. Clark
{"title":"Metadata: Document metadata, tracking and tracing","authors":"A. J. Clark","doi":"10.1016/S1353-4858(07)70062-4","DOIUrl":"https://doi.org/10.1016/S1353-4858(07)70062-4","url":null,"abstract":"","PeriodicalId":120600,"journal":{"name":"Network Security archive","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"118837727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信