메뉴 건너뛰기




Volumn 3, Issue 1, 2007, Pages 51-60

Malware: A future framework for device, network and service management

Author keywords

[No Author keywords available]

Indexed keywords

DATA PRIVACY; INDUSTRIAL ECONOMICS; INTERNET; NETWORK MANAGEMENT; SECURITY OF DATA;

EID: 33947605002     PISSN: 17729890     EISSN: 17729904     Source Type: Journal    
DOI: 10.1007/s11416-007-0037-1     Document Type: Article
Times cited : (3)

References (24)
  • 4
    • 33646735570 scopus 로고    scopus 로고
    • Doyen, G., Nataf, E., Festor, O.: A hierarchical architecture for a distributed management of p2p networks and services. In: Schönwälder J., Serrat J., (eds). DSOM, ser. Lecture Notes in Computer Science, 3775. Springer, pp 257-268 (2005)
    • Doyen, G., Nataf, E., Festor, O.: A hierarchical architecture for a distributed management of p2p networks and services. In: Schönwälder J., Serrat J., (eds). DSOM, ser. Lecture Notes in Computer Science, vol. 3775. Springer, pp 257-268 (2005)
  • 5
    • 33947588121 scopus 로고    scopus 로고
    • prison time for bot master
    • Lemos, R.: Major prison time for bot master, http://www.securityfocus. com/brief/205 (2006)
    • (2006) Major
    • Lemos, R.1
  • 7
    • 79960397800 scopus 로고    scopus 로고
    • Aitel, D.: Nematodes, http://www.immunitysec.com/resources-papers.shtml (2006)
    • (2006) Nematodes
    • Aitel, D.1
  • 13
    • 84878539748 scopus 로고
    • Flexible Network Management Using Active Network Framework
    • Covaci S, ed, Active networks: Proceedings of 1st international working Conference, IWAN'99, Berlin, Springer, Heidelberg
    • Sugauchi, K., Miyazaki, S., Yoshida, K., Nakane, S., Covaci, K., Zhang, T.: Flexible Network Management Using Active Network Framework. In: Covaci S. (ed.) Active networks: Proceedings of 1st international working Conference, IWAN'99, Berlin. LNCS 1653, pp. 241-248. Springer, Heidelberg (1999)
    • (1653) LNCS , pp. 241-248
    • Sugauchi, K.1    Miyazaki, S.2    Yoshida, K.3    Nakane, S.4    Covaci, K.5    Zhang, T.6
  • 19
    • 33947581878 scopus 로고    scopus 로고
    • IETF: Network working group c. kalt request for comments:2810 (2000)
    • IETF: Network working group c. kalt request for comments:2810 (2000)
  • 20
    • 84955557456 scopus 로고    scopus 로고
    • Hiding routing information
    • Goldschlag, D., Reed, M., Syverson, P.: Hiding routing information. LNCS 1174, 137-150 (1996)
    • (1996) LNCS , vol.1174 , pp. 137-150
    • Goldschlag, D.1    Reed, M.2    Syverson, P.3
  • 21
    • 35048892939 scopus 로고    scopus 로고
    • Cridlig, V., Festor, O., State, R.: Role-based access control for xml enabled management gateways. In: Sahai A., Wu F. (eds.) DSOM, ser. Lecture Notes in Computer Science, 3278, pp. 183-195. Springer, Heidelberg (2004)
    • Cridlig, V., Festor, O., State, R.: Role-based access control for xml enabled management gateways. In: Sahai A., Wu F. (eds.) DSOM, ser. Lecture Notes in Computer Science, vol. 3278, pp. 183-195. Springer, Heidelberg (2004)
  • 22
    • 33947579788 scopus 로고    scopus 로고
    • Filiol, E.: Computer Viruses: From Theory To Applications.Springer, Heidelberg (2005)
    • Filiol, E.: Computer Viruses: From Theory To Applications.Springer, Heidelberg (2005)
  • 24
    • 33947578501 scopus 로고    scopus 로고
    • Strong cryptography armoured computer viruses forbidding code analysis: The bradley virus
    • Filiol, E.: Strong cryptography armoured computer viruses forbidding code analysis: the bradley virus. In: EICAR2005 annual conference 14, StJuliens/Valletta-Malta (2005)
    • (2005) EICAR2005 annual conference 14, StJuliens/Valletta-Malta
    • Filiol, E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.