Changes of Cyber-Terrorism: Autonomous Terrors and Counter-Measures
暂无分享,去创建一个
[1] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[2] United Kingdom Parliament,et al. Anti-Terrorism, Crime and Security Act 2001 , 2001, The United Kingdom's Legal Responses to Terrorism.
[3] Christian F. Tschudin,et al. Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.
[4] Antonio Corradi,et al. A secure and open mobile agent programming environment , 1999, Proceedings. Fourth International Symposium on Autonomous Decentralized Systems. - Integration of Heterogeneous Systems -.
[5] Dongho Won,et al. Information System Modeling for Analysis of Propagation Effects and Levels of Damage , 2006, ICCSA.
[6] Benjamin Edelman,et al. Internet Filtering in China , 2003, IEEE Internet Comput..
[7] Wayne A. Jansen,et al. Countermeasures for mobile agent security , 2000, Comput. Commun..
[8] Dongho Won,et al. A Time-Variant Risk Analysis and Damage Estimation for Large-Scale Network Systems , 2005, ICCSA.
[9] David Taniar,et al. Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part I , 2006, ICCSA.
[10] J.M. Estevez-Tapiador. The Emergence of Cyber-Terrorism , 2004, IEEE Distributed Systems Online.
[11] Dongho Won,et al. A Method for Detecting the Exposure of OCSP Responder's Session Private Key in D-OCSP-KIS , 2005, EuroPKI.