RSS feed Add to your Facebook page LinkedIn Watch us on Youtube
  
  
  
  
Access
  
$MP-IST-091-COVER.pdf
  
Cover Pages11/22/2010Open Access
$MP-IST-091-ES.pdf
  
Executive Summary and Synthèse11/22/2010Open Access
$MP-IST-091-PC.pdf
  
Programme Committee11/22/2010Open Access
$MP-IST-091-T.doc
  
Technical Evaluation Report11/22/2010Open Access
MP-IST-091-01.pdf
  
Metrics-based Computer Network Defence Decision Support11/22/2010Open Access
MP-IST-091-02.doc
  
Security Shift in Future Network Architectures11/22/2010Open Access
MP-IST-091-03.doc
  
FIoVis: Leveraging Visualization to Protect Sensitive Network Infrastructure11/22/2010Open Access
MP-IST-091-04.doc
  
Guilt by Association-based Discovery of Botnet Footprints11/22/2010Open Access
MP-IST-091-05.doc
  
Web Service Security in an Air C2 System11/22/2010Open Access
MP-IST-091-07.pdf
  
Hardware Acceleration for Cyber Security11/22/2010Open Access
MP-IST-091-09.pdf
  
Assessing and Managing Quality of Information Assurance11/22/2010Open Access
MP-IST-091-10.pdf
  
Extending Mondrian Memory Protection11/22/2010Open Access
MP-IST-091-11.doc
  
Self-Defence of Information Systems in Cyber-Space. A Critical Overview11/22/2010Open Access
MP-IST-091-12.doc
  
Information Security in Maritime Domain Awareness11/22/2010Open Access
MP-IST-091-13.pdf
  
Short Signature Scheme from Bilinear Pairings11/22/2010Open Access
MP-IST-091-14.pdf
  
Combining Security Assurance and High Performance in Hostile Environments11/22/2010Open Access
MP-IST-091-16.doc
  
Validation of the PCN Concept: Mobility, Traffic Flow Confidentiality and Protection against Directed Attacks;11/22/2010Open Access
MP-IST-091-17.doc
  
On Hierarchical Threshold Access Structures11/22/2010Open Access
MP-IST-091-18.pdf
  
Security Evaluation and Hardening of Free and Open Source Software (FOSS)11/22/2010Open Access
MP-IST-091-19.doc
  
Systemic Policy Compliance in a Multi-Jurisdictional Defence Program – Defence Suppliers Perspective11/22/2010Open Access
MP-IST-091-20.doc
  
Research and Development Projects Launched in Response to the Dynamic Evolution of Internet Security Threats – A Perspective of a CERT Team11/22/2010Open Access
MP-IST-091-21.doc
  
Developing a Cooperative Intrusion Detection System for Wireless Sensor Networks11/22/2010Open Access
MP-IST-091-22.doc
  
A Proposal for an XML Confidentiality Label and Related Binding of Metadata to Data Objects11/22/2010Open Access
MP-IST-091-24.doc
  
Using Anticipative Malware Analysis to Support Decision Making11/22/2010Open Access
MP-IST-091-25.doc
  
Living with the Enemy: Containing a Network Attacker When You Can’t Afford to Eliminate Him11/22/2010Open Access
MP-IST-091-26.pdf
  
Automated Attacker Correlation for Malicious Code11/22/2010Open Access
MP-IST-091-27.doc
  
Rumour Detection in Information Warfare: Understanding Publishing Behaviours as a Prerequisite11/22/2010Open Access
MP-IST-091-28.pdf
  
Combining Trust and Behavioural Analysis to Detect Security Threats in Open Environments11/22/2010Open Access
MP-IST-091-P01.doc
  
Cyber Defence in the Armed Forces of the Czech Republic11/22/2010Open Access
MP-IST-091-P02.doc
  
From Signature-Based Towards Behaviour-Based Anomaly Detection11/22/2010Open Access
MP-IST-091-P03.doc
  
Coalition Network Defence Common Operational Picture11/22/2010Open Access
MP-IST-091-P04.doc
  
RFID as a Tool in Cyber Warfare11/22/2010Open Access
MP-IST-091-P05.pdf
  
Tunneling Activities Detection Using Machine Learning Techniques11/22/2010Open Access
MP-IST-091-P06.doc
  
Protected Core Networking - Concepts & Challenges11/22/2010Open Access
MP-IST-091-P08.doc
  
Extension of the Genetic Algorithm Based Malware Strategy Evolution Forecasting Model for Botnet Strategy Evolution Modeling11/22/2010Open Access
MP-IST-091-P09.doc
  
Secure FAST: Security Enhancement in the NATO Time Sensitive Targeting Tool11/22/2010Open Access
MP-IST-091-P10.doc
  
Authentication and Authorization of Users and Services in Federated SOA Environmnets – Challenges and Opportunities11/22/2010Open Access
MP-IST-091-P11.doc
  
Anomaly Detection Framework Based on Matching Pursuit for Network Security Enhancement11/22/2010Open Access
MP-IST-091-P12.doc
  
Speaker Verification using SVM11/22/2010Open Access
MP-IST-091-P13.pdf
  
Short Signature Scheme From Bilinear Pairings11/22/2010Open Access
MP-IST-091-P14.doc
  
A Survey on SCADA / Distributed Control Systems - Current Security Development and Studies11/22/2010Open Access
MP-IST-091-P15.doc
  
A Processing of OFDM Signals from UAV on Digital Antenna Array of Base Station in Conditions of Jammers11/22/2010Open Access