vasospasm 发表于 2025-3-28 14:55:01

http://reply.papertrans.cn/24/2337/233635/233635_41.png

aviator 发表于 2025-3-28 21:55:01

0302-9743 onference on Mat- matical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2010) held in St. Petersburg, Russia, during September 8-10, 2010. The conference was organized by the Institution of the Russian Academy of Sciences St. Petersburg Institute for Informatics and Autom

礼节 发表于 2025-3-28 23:35:17

Quarks, Gluonen und starke Wechselwirkungply shift to implementation flaws above the level of the primitive operations of the language (e.g., SQL-injection attacks). Thus, next-generation languages need type systems that can express and enforce application-specific security policies.

通知 发表于 2025-3-29 04:34:17

http://reply.papertrans.cn/24/2337/233635/233635_44.png

CRAMP 发表于 2025-3-29 11:02:37

http://reply.papertrans.cn/24/2337/233635/233635_45.png

Omniscient 发表于 2025-3-29 13:28:04

Integrating Types and Specifications for Secure Software Developmentply shift to implementation flaws above the level of the primitive operations of the language (e.g., SQL-injection attacks). Thus, next-generation languages need type systems that can express and enforce application-specific security policies.

Projection 发表于 2025-3-29 15:49:54

Attack and Defense Modeling with BDMPtes the theoretical foundations of such an adaptation and presents new developments on defensive aspects. In particular, detection and reaction modeling are fully integrated in an augmented theoretical framework. Different use-cases and quantification examples illustrate the relevance of the overall approach.

Directed 发表于 2025-3-29 22:36:25

Intellectual Intrusion Detection with Sequences Alignment Methodspossible to detect the mutations of attack, having a signature of it. The second technique is applicable to anomaly detection. We discuss what algorithms of sequences alignment can be used in these methods and show the effectiveness of these techniques on practice.

压碎 发表于 2025-3-30 02:37:59

http://reply.papertrans.cn/24/2337/233635/233635_49.png

祸害隐伏 发表于 2025-3-30 04:25:21

Model Checking of Location and Mobility Related Security Policy Specifications in Ambient Calculusedicate Logic and Ambient Calculus. The presented tool is capable of spatial model checking of Ambient Calculus specifications for security policy rules and uses the NuSMV model checker for temporal model checking.
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Computer Network Security; 5th International Co Igor Kotenko,Victor Skormin Conference proceedings 2010 Springer-Verlag Berlin Heidelberg 2