中图分类
执行
    中文(共0篇) 外文(共2402篇)
    排序:
    导出 保存至文件
    [科技报告]   Zhang, X.        共188页
    摘要 : High-quality online services demand reliable packet delivery at the network layer. However, clear evidence documents the existence of compromised routers in ISP and enterprise networks, threatening network availability and reliabi... 展开

    [科技报告]   Metcalf, L.   Spring, J.        共11页
    摘要 : Domain parking is the practice of assigning a nonsense address to a domain when it is not in use in order to keep it ready for live use. This practice is peculiar because it indicates someone has administrative control over the do... 展开

    [科技报告]   Duffany, J.   Galban, O.        共11页
    摘要 : When people talk about hacking and social networks, they're not referring to the common definition of hacking, which is using malicious code or backdoors in computer networks to damage systems or steal proprietary information. Hac... 展开

    [科技报告]   Campbell, P. L.        共40页
    摘要 : COBIT is a set of documents that provides guidance for computer security. This report introduces COBIT by answering the following questions, after first defining acronyms and presenting definitions: 1. Why is COBIT valuable. 2. Wh... 展开

    [科技报告]   E. E. Schultz        共13页
    摘要 : The purpose of this paper is to evaluate two Federal statutes, the Computer Fraud and Abuse Act of 1986 and the Computer Security Act of 1987, from the perspective of computer security incident response efforts. First, the major r... 展开

    [科技报告]   Maier, G.   Feldmann, A.   Paxson, V.   Sommer, R.   Vallentin, M.        共23页
    摘要 : While conventional wisdom holds that residential users experience a high degree of compromise and infection, this presumption has seen little validation in the way of an in-depth study. In this paper we present a first step toward... 展开

    [科技报告]   Stevens, D. F.        共10页
    摘要 : Internet. Discussions of the Internet encourage the misapprehension that there is a single, uniform user community instead of a loose alliance of many cultures that differ in many fundamental aspects. At this Workshop, we had repr... 展开
    关键词 : Computer Networks   Security  

    [科技报告]   Strickler, D.   Chester, R.   Ingle, K.   Payne, P.   Rome, J.        共18页
    摘要 : An inventory management plan is presented for the local area network (LAN) for the Security Aspects of Database Management Systems, a Department of Energy (DOE)-sponsored project examining computer and network security in a data m... 展开
    关键词 : Computer Networks   Security  

    [科技报告]   Herzog, J.   Wachman, G.   Liu, D.        共8页
    摘要 : Cognitive networking mechanisms promise to greatly improve network performance over non-cognitive mechanisms, by making more efficient use of bandwidth, spectrum, and power. However, these mechanisms must be designed with cyber se... 展开

    [科技报告]   Hamlen, K.   Kantarcioglu, M.   Khan, L.   Thuraisingham, B.        共15页
    摘要 : In this paper we discuss security issues for cloud computing including storage security, data security, and network security and secure virtualization. Then we select some topics and describe them in more detail. In particular, we... 展开

    研究趋势
    相关热图
    学科分类