RSS feed Add to your Facebook page LinkedIn Watch us on Youtube
  
  
  
  
Access
  
$MP-IST-076-KN.pdf
  
Cyberspace and the Changing Nature of Warfare10/3/2008Open Access
MP-IST-076-01.pdf
  
Defending against Denial of Service in a Self-Aware Network: A Practical Approach10/3/2008Open Access
MP-IST-076-02.doc
  
Efficient Analysis Distribution for Intrusion Detection10/3/2008Open Access
MP-IST-076-08.pdf
  
MITE-MANET Intrusion Detection for Tactical Environments10/3/2008Open Access
MP-IST-076-09.pdf
  
Efficient Signature Management for Intrusion Detection in Mobile Ad-hoc Networks10/3/2008Open Access
MP-IST-076-10.doc
  
Information Assurance Situation Awareness for Tactical MANETs10/3/2008Open Access
MP-IST-076-11.pdf
  
Identifying Critical Attack Assets in Dependency Attack Graphs10/3/2008Open Access
MP-IST-076-12.pdf
  
Deriving Authentication for Pervasive Security10/3/2008Open Access
MP-IST-076-14.doc
  
MLWeb: Supporting Assured, Web-Based Collaboration in Dynamic Coalitions10/3/2008Open Access
MP-IST-076-15.doc
  
Fine-Grained Cryptographic Access Control for Classified Information Sharing10/3/2008Open Access
MP-IST-076-16.doc
  
Protecting SECRET While Sharing Information with Non-NATO Partners10/3/2008Open Access
MP-IST-076-17.pdf
  
Mirage Theory: A Deception Approach to Intrusion Detection in Process Control Networks10/3/2008Open Access
MP-IST-076-18.pdf
  
Hardware-Accelerated Framework for Security in High-Speed Networks10/3/2008Open Access
MP-IST-076-19.doc
  
Assuring Security in Disadvantaged Networks Based on RFID Systems10/3/2008Open Access
MP-IST-076-P1.doc
  
DoS Testing of Two IP Telephony Software10/3/2008Open Access
MP-IST-076-P3.doc
  
XML Based Security Labeling10/3/2008Open Access
MP-IST-076-P4.doc
  
An Active Trust Model for Airborne Networks10/3/2008Open Access