Pub Date : 2010-09-08DOI: 10.1007/978-3-642-14706-7_12
Devrim Unal, Ozan Akar, M. Çaglayan
{"title":"Model Checking of Location and Mobility Related Security Policy Specifications in Ambient Calculus","authors":"Devrim Unal, Ozan Akar, M. Çaglayan","doi":"10.1007/978-3-642-14706-7_12","DOIUrl":"https://doi.org/10.1007/978-3-642-14706-7_12","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"451 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122157110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-08DOI: 10.1007/978-3-642-14706-7_9
A. Grusho, N. A. Grusho, E. Timonina
{"title":"Problems of Modeling in the Analysis of Covert Channels","authors":"A. Grusho, N. A. Grusho, E. Timonina","doi":"10.1007/978-3-642-14706-7_9","DOIUrl":"https://doi.org/10.1007/978-3-642-14706-7_9","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131967726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-08DOI: 10.1007/978-3-642-14706-7_19
H. Nguyen, Slobodan V. Petrovic, K. Franke
{"title":"A Comparison of Feature-Selection Methods for Intrusion Detection","authors":"H. Nguyen, Slobodan V. Petrovic, K. Franke","doi":"10.1007/978-3-642-14706-7_19","DOIUrl":"https://doi.org/10.1007/978-3-642-14706-7_19","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"2019 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128058787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-08DOI: 10.1007/978-3-642-14706-7_20
Peter Teufl, Udo Payer, G. Lackner
{"title":"From NLP (Natural Language Processing) to MLP (Machine Language Processing)","authors":"Peter Teufl, Udo Payer, G. Lackner","doi":"10.1007/978-3-642-14706-7_20","DOIUrl":"https://doi.org/10.1007/978-3-642-14706-7_20","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122350733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-08DOI: 10.1007/978-3-642-14706-7_23
V. Desnitsky, Igor Kotenko
{"title":"Security and Scalability of Remote Entrusting Protection","authors":"V. Desnitsky, Igor Kotenko","doi":"10.1007/978-3-642-14706-7_23","DOIUrl":"https://doi.org/10.1007/978-3-642-14706-7_23","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132156699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-08DOI: 10.1007/978-3-642-14706-7_21
Stefan Kraxberger, Peter Danner, Daniel M. Hein
{"title":"Secure Multi-Agent System for Multi-Hop Environments","authors":"Stefan Kraxberger, Peter Danner, Daniel M. Hein","doi":"10.1007/978-3-642-14706-7_21","DOIUrl":"https://doi.org/10.1007/978-3-642-14706-7_21","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124810095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Unique User-Generated Digital Pseudonyms","authors":"P. Schartner, Martin Schaffer","doi":"10.1007/11560326_15","DOIUrl":"https://doi.org/10.1007/11560326_15","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115312707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}