


default search action
Information Security Technical Report, Volume 12
Volume 12, Number 1, 2007
- Stephen D. Wolthusen:

ISTR special issue on critical infrastructure protection. 1 - Walter Schmitz:

Simulation and test: Instruments for Critical Infrastructure Protection (CIP). 2-15 - Jan Arild Audestad:

Internet as a multiple graph structure: The role of the transport layer. 16-23 - Rodrigo Roman, Cristina Alcaraz

, Javier López
:
The role of Wireless Sensor Networks in the area of Critical Information Infrastructure Protection. 24-31 - Khaled Elgoarany, Mohamed Eltoweissy:

Security in Mobile IPv6: A survey. 32-43 - Nils Kalstad Svendsen, Stephen D. Wolthusen:

Connectivity models of interdependency in mixed-type critical infrastructure networks. 44-55 - Kalle Burbeck, Simin Nadjm-Tehrani:

Adaptive real-time anomaly detection with incremental clustering. 56-67
Volume 12, Number 2, 2007
- Andrew Jones

:
Convergence. 69-73 - Richard Clayton:

Can CLI be trusted? 74-79 - E. Eugene Schultz:

Risks due to convergence of physical security systems and information technology environments. 80-84 - Richard H. Paine:

Secure Mobile Architecture (SMA) - A way to fix the broken Internet. 85-89 - Paul King:

In the new converged world are we secure enough? 90-97 - Raj Samani:

When networks collide. 98-110
Volume 12, Number 3, 2007
- Allan Tomlinson:

Editorial. 111-112 - Andrew P. Martin

, Po-Wah Yau:
Grid security: Next steps. 113-122 - Haibo Chen, Jieyun Chen, Wenbo Mao, Fei Yan:

Daonity - Grid security from two levels of virtualization. 123-138 - Javier López

, Isaac Agudo
, José A. Montenegro:
On the deployment of a real scalable delegation service. 139-146 - David W. Chadwick

:
Coordinated decision making in distributed applications. 147-154 - Christof Paar, André Weimerskirch:

Embedded security in a pervasive world. 155-161 - Adrian Leung, Yingli Sheng, Haitham S. Cruickshank:

The security challenges for mobile ubiquitous services. 162-171 - Zia Hayat, Jeff Reeve, Chris Boutle:

Ubiquitous security for ubiquitous computing. 172-178 - Jianying Zhou

, Wee-Yung Chin, Rodrigo Roman, Javier López
:
An effective multi-layered defense framework against spam. 179-185
Volume 12, Number 4, 2007
- Michael J. Ganley:

Introduction to this issue (12/4). 187 - Richard E. Overill:

Computational immunology and anomaly detection. 188-191 - Mark Burgess:

Biology, immunology and information security. 192-199 - Robert Ghanea-Hercock:

Survival in cyberspace. 200-208 - Kamran Shafi, Hussein A. Abbass

:
Biologically-inspired Complex Adaptive Systems approaches to Network Intrusion Detection. 209-217 - Uwe Aickelin

, Julie Greensmith:
Sensing danger: Innate immunology for intrusion detection. 218-227 - Anil Somayaji:

Immunology, diversity, and homeostasis: The past and future of biologically inspired computer defenses. 228-234 - Dipankar Dasgupta:

Immuno-inspired autonomic system for cyber defense. 235-241 - Erol Gelenbe

:
Dealing with software viruses: A biological paradigm. 242-250

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














