-
1
-
-
84896294460
-
Comptroller of the Currency Administer of National Banks, Payment Systems and Funds Transfer Activities
-
Anonymous (1990) "Comptroller of the Currency Administer of National Banks, Payment Systems and Funds Transfer Activities", Comptroller's Handbook.
-
(1990)
Comptroller's Handbook
-
-
-
2
-
-
84896267128
-
Computers & operations: consolidation, truncation mark Fed operations strategy
-
I. New York: August
-
Anonymous (1992) "Computers & operations: consolidation, truncation mark Fed operations strategy". American Bankers Association. I. New York: August, Vol. 84, Iss. 8, p. 58.
-
(1992)
American Bankers Association
, vol.84
, Issue.8
, pp. 58
-
-
-
3
-
-
84896262010
-
Presidential Decision Directive 63, Critical Infrastructure Protection: Sector Coordinators
-
Presidential Decision Directive 63, Federal Register, 5 August
-
Anonymous (1998) "Presidential Decision Directive 63, Critical Infrastructure Protection: Sector Coordinators, Presidential Decision Directive 63, Federal Register 63, no. 150 (5 August): 41804.
-
(1998)
, vol.63
, Issue.150
, pp. 41804
-
-
-
4
-
-
84896275388
-
Board of Governors from the Federal Reserve Bank
-
[online], MCIL
-
Anonymous (2005) "Board of Governors from the Federal Reserve Bank", [online], MCIL, http://www.federalreserve.gov, 2005.
-
(2005)
-
-
-
5
-
-
80053140625
-
The netfilter / iptables project
-
[online], MCIL, Netfilter
-
Anonymous (2005) "The netfilter / iptables project", [online], MCIL, Netfilter. http://netfilter.samba.org/.
-
(2005)
-
-
-
6
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
February
-
Chaum, D. (1981) "Untraceable electronic mail, return addresses, and digital pseudonyms", Communications of the ACM, vol. 4, no. 2, February.
-
(1981)
Communications of the ACM
, vol.4
, Issue.2
-
-
Chaum, D.1
-
8
-
-
27944510109
-
Longitudinal study of internet traffic in 1998-2003
-
Fomenkov, M., Keys, K., Moore, D. & Claffy, K. (2004) "Longitudinal study of internet traffic in 1998-2003", Proceedings of the winter international symposium on Information and communication technologies.
-
(2004)
Proceedings of the winter international symposium on Information and communication technologies
-
-
Fomenkov, M.1
Keys, K.2
Moore, D.3
Claffy, K.4
-
9
-
-
33644950551
-
The Federal Reserve System: Purposes & Functions
-
Ninth Edition, June, 2005
-
Fox, L. (2005) "The Federal Reserve System: Purposes & Functions", Ninth Edition, June 2005.
-
(2005)
-
-
Fox, L.1
-
10
-
-
0003866461
-
Packet-level traffic measurements from a tier-1 ip backbone
-
Technical report, Sprint
-
Fraleigh, C., Moon, S., Diot, C., Lyles, B., & Tobagi, F. (2001) "Packet-level traffic measurements from a tier-1 ip backbone", Technical report, Sprint.
-
(2001)
-
-
Fraleigh, C.1
Moon, S.2
Diot, C.3
Lyles, B.4
Tobagi, F.5
-
11
-
-
27944485356
-
On Flow Marking Attacks in Wireless Anonymous Communication Networks
-
June 6-10
-
Fu, X., Zhu, Y., Graham, B., Bettati, R., & Zhao, W. (2005) "On Flow Marking Attacks in Wireless Anonymous Communication Networks", Proceedings of International Conference on Distributed and Computing Systems (ICDCS), June 6-10.
-
(2005)
Proceedings of International Conference on Distributed and Computing Systems (ICDCS)
-
-
Fu, X.1
Zhu, Y.2
Graham, B.3
Bettati, R.4
Zhao, W.5
-
12
-
-
84896269018
-
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures
-
6th Information Hiding Workshop (IH), May 23~25, Toronto, Ontario, Canada
-
Fu, X., Graham, B., Xuan, D., Bettati, R., & Zhao, W. (2004) "Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures", 6th Information Hiding Workshop (IH), May 23~25, Toronto, Ontario, Canada.
-
(2004)
-
-
Fu, X.1
Graham, B.2
Xuan, D.3
Bettati, R.4
Zhao, W.5
-
13
-
-
0035402083
-
Camouflaging network traffic for QoS-guaranteed critical all applications
-
July, volume 31 of 4
-
Guan, Y., Fu, X., Xuan, D., Shenoy, P. U., Bettati, R., and Zhao, W. Netcamo (July, 2001) "Camouflaging network traffic for QoS-guaranteed critical all applications"m IEEE Transactions on Systems, Man, and Cybernetics Part A: Systems and Humans, Special Issue on Information Assurance, volume 31 of 4, pages 253~265.
-
(2001)
IEEE Transactions on Systems, Man, and Cybernetics Part A: Systems and Humans, Special Issue on Information Assurance
-
-
Guan, Y.1
Fu, X.2
Xuan, D.3
Shenoy, P.U.4
Bettati, R.5
Netcamo, Z.W.6
-
14
-
-
0004216472
-
Network Security: Private Communication in a Public World
-
Second Edition, Prentice Hall PTR
-
Kaufman, C., Perlman, R., & Speciner, M. (2002) Network Security: Private Communication in a Public World, Second Edition, Prentice Hall PTR.
-
(2002)
-
-
Kaufman, C.1
Perlman, R.2
Speciner, M.3
-
16
-
-
85065559785
-
Performance analysis of a method for high level prevention of traffic analysis
-
Eighth Annual
-
Newman-Wolfe, R.E. & Venkatraman, B.R. (1992) "Performance analysis of a method for high level prevention of traffic analysis", Computer Security Applications Conference, Eighth Annual, pages 123~130.
-
(1992)
Computer Security Applications Conference
-
-
Newman-Wolfe, R.E.1
Venkatraman, B.R.2
-
17
-
-
0028713303
-
Performance analysis of a method for high level prevention of traffic analysis using measurements from a campus network
-
10th Annual
-
Newman-Wolfe, R.E. & Venkatraman, B.R. (1994) "Performance analysis of a method for high level prevention of traffic analysis using measurements from a campus network", Computer Security Applications Conference, 10th Annual, pages 288 ~297.
-
(1994)
Computer Security Applications Conference
-
-
Newman-Wolfe, R.E.1
Venkatraman, B.R.2
-
18
-
-
84896308206
-
E-checks pace ACH growth, American Bankers Association
-
New York, June
-
Orr, B. (2004) "E-checks pace ACH growth, American Bankers Association", ABA Banking Journal. New York:. 96(6), p. 72, June.
-
(2004)
ABA Banking Journal
, vol.96
, Issue.6
, pp. 72
-
-
Orr, B.1
-
19
-
-
84896258954
-
Security in Banking Computer Security Reference Book
-
Butterworth Heinemann
-
Pugh, B. Security in Banking Computer Security Reference Book, Butterworth Heinemann.
-
-
-
Pugh, B.1
-
20
-
-
1842595638
-
Linux netfilter Hacking HOWTO
-
[online], MCIL
-
Russell, R. & Welte, H. (2002) "Linux netfilter Hacking HOWTO", [online], MCIL, http://www.netfilter.org/documentation/HOWTO/netfilter-hacking-HOWTO-1.html#ss1.1
-
(2002)
-
-
Russell, R.1
Welte, H.2
-
21
-
-
0031274649
-
Wide-area internet traffic patterns and characteristics
-
November/December
-
Thompson, K., Miller, G., & Wilder, R. (1997), "Wide-area internet traffic patterns and characteristics", IEEE Network magazine, 11(6), November/December.
-
(1997)
IEEE Network magazine
, vol.11
, Issue.6
-
-
Thompson, K.1
Miller, G.2
Wilder, R.3
-
22
-
-
84872245123
-
Why TCP over TCP is a bad idea
-
[online], MCIL
-
Titz, O. (1996) "Why TCP over TCP is a bad idea", [online], MCIL, http://sites.inka.de/sites/bigred/devel/tcp-tcp.html.
-
(1996)
-
-
Titz, O.1
-
23
-
-
84896265765
-
Bank for International Settlement: Committee on Payment and Settlement Systems, Payment and Settlement Systems in Selected Countries
-
Press & Communications
-
Tommaso, P. (2003) "Bank for International Settlement: Committee on Payment and Settlement Systems, Payment and Settlement Systems in Selected Countries", Press & Communications.
-
(2003)
-
-
Tommaso, P.1
-
24
-
-
84896264671
-
Monetary Policy and Credit Availability Effects of Electronic Funds Transfers
-
Seattle: Spring
-
Tucker, D. (1978) "Monetary Policy and Credit Availability Effects of Electronic Funds Transfers", Journal of Contemporary Business, Seattle: Spring, 7(2), p. 149.
-
(1978)
Journal of Contemporary Business
, vol.7
, Issue.2
, pp. 149
-
-
Tucker, D.1
-
25
-
-
84896264072
-
Security mechanisms in high-level network protocols
-
Voydoc, V. and Kent, S. (1983) Security mechanisms in high-level network protocols.
-
(1983)
-
-
Voydoc, V.1
Kent, S.2
-
26
-
-
34250785454
-
On Flow Correlation Attacks and Countermeasures in Mix Networks
-
Workshop on Privacy Enhancing Technologies (PET), Toronto, Canada, May 26-28
-
Zhu, Y., Fu, X., Graham, B., Bettati, R., & Zhao, W. (2004) "On Flow Correlation Attacks and Countermeasures in Mix Networks", Workshop on Privacy Enhancing Technologies (PET), Toronto, Canada, May 26-28
-
(2004)
-
-
Zhu, Y.1
Fu, X.2
Graham, B.3
Bettati, R.4
Zhao, W.5
|