-
1
-
-
33751119325
-
-
Hae-Jin Jeong; Il-Seop Song; et-al; A Multi-dimension Rule Update in a TCAM-based High-Performance Network Security SystemAdvanced Information Networking and Applications, 2006. AINA 2006, 20th International Conference on 2, 18-20 April 2006 Page(s):62 - 66
-
Hae-Jin Jeong; Il-Seop Song; et-al; "A Multi-dimension Rule Update in a TCAM-based High-Performance Network Security System"Advanced Information Networking and Applications, 2006. AINA 2006, 20th International Conference on Volume 2, 18-20 April 2006 Page(s):62 - 66
-
-
-
-
2
-
-
34250787999
-
Network Security Policies: Verification, Optimization and Testing Network Operations and Management Symposium, 2006. NOMS 2006
-
Pages
-
Al-Shaer, E; "Network Security Policies: Verification, Optimization and Testing" Network Operations and Management Symposium, 2006. NOMS 2006, 10th IEEE/IFIP, 2006 Page(s):584 - 584
-
(2006)
10th IEEE/IFIP
, pp. 584-584
-
-
Al-Shaer, E.1
-
3
-
-
49249095232
-
-
Magic quadrant, Symantec network access control; the key to endpoint security advertising section report 2006, www.symantec.com/ endpoint
-
Magic quadrant, "Symantec network access control; the key to endpoint security" advertising section report 2006, www.symantec.com/ endpoint
-
-
-
-
4
-
-
33645337636
-
Taxonomy of conflicts in network security policies
-
March Pages
-
Hamed, H.; Al-Shaer, E; "Taxonomy of conflicts in network security policies" Communications Magazine, IEEE, Volume 44, Issue 3, March 2006 Page(s):134-141
-
(2006)
Communications Magazine, IEEE
, vol.44
, Issue.3
, pp. 134-141
-
-
Hamed, H.1
Al-Shaer, E.2
-
5
-
-
33750947289
-
Design and Development of Network Intrusion Detection System Detection Scheme on Network Processing Unit Advanced Communication Technology, 2006. ICACT 2006
-
20-22 Feb, Pages
-
Salim, R.; Rao, G.S.V.R.K;" Design and Development of Network Intrusion Detection System Detection Scheme on Network Processing Unit" Advanced Communication Technology, 2006. ICACT 2006, the 8th International Conference, Volume 2, 20-22 Feb. 2006 Page(s):1023-1025
-
(2006)
the 8th International Conference
, vol.2
, pp. 1023-1025
-
-
Salim, R.1
Rao, G.S.V.R.K.2
-
6
-
-
49249101065
-
An analytical revelation for a safer network security perimeter
-
Sendai, Japan, 14-17 January
-
Adnan A. Arain, Marvie, Manzoor Hashmani, "An analytical revelation for a safer network security perimeter", 2006 proceedings of Intentional Conference on Information and Networks-ICOIN2006 Sendai, Japan, 14-17 January 2006
-
(2006)
2006 proceedings of Intentional Conference on Information and Networks-ICOIN2006
-
-
Arain, A.A.1
Marvie, M.H.2
-
7
-
-
33749063636
-
Characterizing sources and remedies for packet loss in network intrusion detection systems Workload Characterization Symposium, 2005
-
6-8 Oct, Pages
-
Schaelicke, L.; Freeland, J.C.; "Characterizing sources and remedies for packet loss in network intrusion detection systems" Workload Characterization Symposium, 2005. Proceedings of the IEEE International 6-8 Oct. 2005 Page(s):188 - 196
-
(2005)
Proceedings of the IEEE International
, pp. 188-196
-
-
Schaelicke, L.1
Freeland, J.C.2
-
8
-
-
28444457772
-
-
Jiang-Neng Yi; Wei-Dong Meng; Wei-Min Ma; Jin-Jun Du; Assess model of network security based on analytic network process Machine Learning and Cybernetics, 2005. Proceedings of 2005 International Conference on 1, 18-21 Aug. 2005 Page(s):27-32 1
-
Jiang-Neng Yi; Wei-Dong Meng; Wei-Min Ma; Jin-Jun Du; "Assess model of network security based on analytic network process" Machine Learning and Cybernetics, 2005. Proceedings of 2005 International Conference on Volume 1, 18-21 Aug. 2005 Page(s):27-32 Vol. 1
-
-
-
-
9
-
-
24744442121
-
-
Harrison, J.V.; Enhancing network security by preventing user-initiated malware execution Information Technology: Coding and Computing, 2005. ITCC 2005, International Conference on 2, 4-6 April 2005 Page(s):597-602 2
-
Harrison, J.V.; "Enhancing network security by preventing user-initiated malware execution" Information Technology: Coding and Computing, 2005. ITCC 2005, International Conference on Volume 2, 4-6 April 2005 Page(s):597-602 Vol. 2
-
-
-
-
10
-
-
33745119422
-
Autonomous decentralized network security system Networking, Sensing and Control, 2005
-
March Pages
-
Yanhui Guo; Cong Wang; "Autonomous decentralized network security system" Networking, Sensing and Control, 2005. Proceedings, 2005 IEEE, 19-22 March 2005 Page(s):279-282
-
(2005)
Proceedings, 2005 IEEE, 19-22
, pp. 279-282
-
-
Guo, Y.1
Wang, C.2
-
12
-
-
49249138573
-
Demystifying network access control
-
white paper
-
Brian Monroe, Security Engineer-STILLSECURE, "Demystifying network access control", white paper 2005, www.stillsecure.com
-
(2005)
-
-
Monroe, B.1
-
13
-
-
4544314000
-
An architecture for dynamic security perimeters of virtual collaborative networks
-
IEEE/IFIP, 19-23 April Pages, 1
-
Djordjevic, I.; Phillips, C.; Dimitrakos, T; "An architecture for dynamic security perimeters of virtual collaborative networks" Network Operations and Management Symposium, 2004. NOMS 2004, IEEE/IFIP, Volume 1, 19-23 April 2004 Page(s):249 - 262 Vol.1
-
(2004)
Network Operations and Management Symposium, 2004. NOMS
, vol.1
, pp. 249-262
-
-
Djordjevic, I.1
Phillips, C.2
Dimitrakos, T.3
-
17
-
-
49249106048
-
CCNA Intro (self study guide)
-
Wendell Odom, "CCNA Intro (self study guide)", CISCO press; Exam 640-821
-
CISCO press; Exam
, pp. 640-821
-
-
Odom, W.1
|