{"title":"Analyzing Vulnerabilities and Measuring Security Level at Design and Exploitation Stages of Computer Network Life Cycle","authors":"Igor Kotenko, M. Stepashkin","doi":"10.1007/11560326_24","DOIUrl":"https://doi.org/10.1007/11560326_24","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124054336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. J. G. Clemente, Jesús D. Jiménez Re, G. Pérez, A. Gómez-Skarmeta
{"title":"Policy-Driven Routing Management Using CIM","authors":"F. J. G. Clemente, Jesús D. Jiménez Re, G. Pérez, A. Gómez-Skarmeta","doi":"10.1007/11560326_20","DOIUrl":"https://doi.org/10.1007/11560326_20","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134095676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Asynchronous Alert Correlation in Multi-agent Intrusion Detection Systems","authors":"V. Gorodetsky, O. Karsaev, V. Samoilov, A. Ulanov","doi":"10.1007/11560326_28","DOIUrl":"https://doi.org/10.1007/11560326_28","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124205098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Models and Analysis of Active Worm Defense","authors":"D. Nicol, M. Liljenstam","doi":"10.1007/11560326_4","DOIUrl":"https://doi.org/10.1007/11560326_4","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114332831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Francis B. Afinidad, T. Levin, C. Irvine, Thuy D. Nguyen
{"title":"Foundation for a Time Interval Access Control Model","authors":"Francis B. Afinidad, T. Levin, C. Irvine, Thuy D. Nguyen","doi":"10.1007/11560326_31","DOIUrl":"https://doi.org/10.1007/11560326_31","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132883702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Temporal Logic-Based Model for Forensic Investigation in Networked System Security","authors":"S. Rekhis, N. Boudriga","doi":"10.1007/11560326_25","DOIUrl":"https://doi.org/10.1007/11560326_25","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128575937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Kim, Sang-Soo Yeo, Hong-Jin Park, Sung Kwon Kim
{"title":"A New Scheme for the Location Information Protection in Mobile Communication Environments","authors":"S. Kim, Sang-Soo Yeo, Hong-Jin Park, Sung Kwon Kim","doi":"10.1007/11560326_36","DOIUrl":"https://doi.org/10.1007/11560326_36","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124625812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}