RSS feed Add to your Facebook page LinkedIn Watch us on Youtube
  
  
  
  
Access
  
$$MP-IST-111-COVER.pdf
  
Cover Pages9/13/2012Open Access
$$MP-IST-111-ES.pdf
  
Executive Summary/Synthèse9/13/2012Open Access
$MP-IST-111-PC.pdf
  
Programme Committee9/13/2012Open Access
$MP-IST-111-T.pdf
  
Technical Evaluation Report9/13/2012Open Access
MP-IST-111-01.docx
  
Clone Search for Malicious Code Correlation9/13/2012Open Access
MP-IST-111-02.doc
  
Automatic Extraction of Domain Name Generation Algorithms from Current Malware9/13/2012Open Access
MP-IST-111-03.pdf
  
Multi-Agent Anomaly-Based APT Detection9/13/2012Open Access
MP-IST-111-04.docx
  
Real-Time Automated Risk Assessment within Protected Core Networking9/13/2012Open Access
MP-IST-111-05.doc
  
A QoP Framework Supporting CIA Negotiation and Trust-Based Path Selection9/13/2012Open Access
MP-IST-111-06.pdf
  
A Secure NEC-Enabling Architecture by Disentangling Infrastructure, Information and Security9/13/2012Open Access
MP-IST-111-07.docx
  
Tracking Incidents across Tranaslational Boundaries9/13/2012Open Access
MP-IST-111-08.docx
  
Intrusion Detection in Tactical Mobile Ad Hoc Networks Using Game Theory9/13/2012Open Access
MP-IST-111-10.doc
  
A Covert System Monitoring Function9/13/2012Open Access
MP-IST-111-11.doc
  
Secure Information Sharing Using Attribute Based Encryption9/13/2012Open Access
MP-IST-111-12.docx
  
A New Approach of Generating Key-Dependent S-BOXes in AES9/13/2012Open Access
MP-IST-111-13.doc
  
Secure Authentication Using PIN-based Cancellable Fingerprint Templates9/13/2012Open Access
MP-IST-111-14.docx
  
Digital Vaccines: Using Identity-Based Digital Signatures for Blue Forces Identification in Cyberspace9/13/2012Open Access
MP-IST-111-15.doc
  
A Pareto Approach to Software Dependability9/13/2012Open Access
MP-IST-111-16.doc
  
A Survey in Threat Detection9/13/2012Open Access
MP-IST-111-17.docx
  
The Multicast Internet Key Exchange (MIKE) in Tactical Ad Hoc Networks9/13/2012Open Access
MP-IST-111-18.doc
  
Proactive Detection and Automated Exchange of Network Security Incidents9/13/2012Open Access
MP-IST-111-19.doc
  
Detection of Multistage Attack in Federation of Systems Environment9/13/2012Open Access
MP-IST-111-20.doc
  
Automatic Reaction to Cyber Attacks on the Basis of Remote Secure Controller9/13/2012Open Access
MP-IST-111-22.doc
  
Supporting Network-Wide Situational Awareness in Tactical MANETs by Local Observations9/13/2012Open Access
MP-IST-111-23.doc
  
Lightweight User Authentication in Wireless Sensor Networks9/13/2012Open Access