X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Patent (173) 173
Conference Proceeding (156) 156
Journal Article (88) 88
Book Chapter (51) 51
Magazine Article (12) 12
Publication (10) 10
Book / eBook (9) 9
Web Resource (7) 7
Government Document (2) 2
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
calculating (130) 130
computing (130) 130
counting (130) 130
physics (130) 130
electric digital data processing (126) 126
electric communication technique (111) 111
electricity (111) 111
transmission of digital information, e.g. telegraphiccommunication (109) 109
computer science (72) 72
data encryption (61) 61
computer communication networks (55) 55
security (35) 35
management of computing and information systems (34) 34
algorithm analysis and problem complexity (28) 28
computer security (26) 26
systems and data security (26) 26
computer science, information systems (25) 25
computers and society (25) 25
operating systems (25) 25
computer science, theory & methods (23) 23
computer science, software engineering (20) 20
data structures, cryptology and information theory (19) 19
computer networks (18) 18
computer systems based on specific computational models (18) 18
information systems applications (16) 16
internet (16) 16
coding and information theory (15) 15
cryptography (15) 15
protection (15) 15
computer systems organization and communication networks (14) 14
data structures (14) 14
telecommunications (14) 14
security measures (12) 12
access control (11) 11
application software (11) 11
network security (11) 11
studies (11) 11
authentication (10) 10
computer architecture (10) 10
data protection (10) 10
networks (10) 10
trust management (10) 10
architecture (9) 9
computer science, hardware & architecture (9) 9
denial of service attacks (9) 9
decoys (8) 8
electronic books (8) 8
informatique (8) 8
ip networks (8) 8
monitoring (8) 8
special purpose and application-based systems (8) 8
bandwidth (7) 7
computer viruses (7) 7
computers (7) 7
cryptology (7) 7
data encoding (7) 7
data security (7) 7
encryption of data (7) 7
engineering, electrical & electronic (7) 7
intrusion detection (7) 7
protocols (7) 7
testing (7) 7
analysis (6) 6
browser (6) 6
computer communication systems (6) 6
credentials (6) 6
information security (6) 6
information systems (6) 6
jamming of communication (6) 6
management (6) 6
math applications in computer science (6) 6
multi-user (6) 6
overlay networks (6) 6
performance (6) 6
privacy (6) 6
prototypes (6) 6
secret communication (6) 6
software (6) 6
telecommunication traffic (6) 6
web server (6) 6
artificial intelligence (5) 5
availability (5) 5
buffer overflows (5) 5
communications engineering, networks (5) 5
computer privacy (5) 5
computer system security (5) 5
computer systems (5) 5
computersicherheit (5) 5
congresses (5) 5
cyber security (5) 5
cybersecurity (5) 5
databases (5) 5
datensicherung (5) 5
electronic digital computers (5) 5
filtering (5) 5
information storage and retrieval systems (5) 5
network servers (5) 5
protection of computer systems (5) 5
rechnernetz (5) 5
reliability (5) 5
more...
Library Location Library Location
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


IEEE Communications Surveys & Tutorials, ISSN 1553-877X, 2012, Volume 14, Issue 2, pp. 514 - 537
We present a comprehensive survey of Voice over IP security academic research, using a set of 245 publications forming a closed cross-citation set. We classify... 
Protocols | security | Taxonomy | Authentication | Media | VoIP | SIP | Servers | Internet telephony | ATTACKS | SESSION INITIATION PROTOCOL | COMPUTER SCIENCE, INFORMATION SYSTEMS | SPIT MANAGEMENT | TELECOMMUNICATIONS | CHALLENGES | SPAM | PERFORMANCE ANALYSIS | INFRASTRUCTURE | AUTHENTICATION SCHEME | TELEPHONY | Communities | Telephones | Classification | Byproducts | Security | Gaps | Voice | VoIP (protocol)
Journal Article
Proceedings of the 14th ACM conference on computer and communications security, ISSN 1543-7221, 10/2007, pp. 541 - 551
Polymorphic malcode remains a troubling threat. The ability formal code to automatically transform into semantically equivalent variants frustrates attempts to... 
signature generation | polymorphism | shellcode | statistical models | Statistical models | Shellcode | Signature generation | Polymorphism
Conference Proceeding
Magazine Article
IEEE Security & Privacy, ISSN 1540-7993, 03/2010, Volume 8, Issue 2, pp. 76 - 78
Journal Article
2006, Advances in information security, ISBN 9780387290157, Volume 20, xiv, 136
Book
Computer Communications, ISSN 0140-3664, 02/2015, Volume 57, pp. 50 - 63
Voice over IP (VoIP) architecture and services consist of different software and hardware components that may be susceptible to a plethora of attacks. Among... 
Anonymity | Entropy | Denial of Service | Session Initiation Protocol | Abnormal traffic | ATTACKS | DEFENSE | PRIVACY | COMPUTER SCIENCE, INFORMATION SYSTEMS | TELECOMMUNICATIONS | ENGINEERING, ELECTRICAL & ELECTRONIC | FRAMEWORK | SECURITY | Networks | Flushing | Denial of service attacks | Telephones | Real time | Computer information security | Voice | VoIP (protocol) | Computer programs
Journal Article
IEEE Journal on Selected Areas in Communications, ISSN 0733-8716, 01/2004, Volume 22, Issue 1, pp. 176 - 188
Journal Article
IEEE Security & Privacy, ISSN 1540-7993, 11/2009, Volume 7, Issue 6, pp. 22 - 29
Insider attacks-that is, attacks by users with privileged knowledge about a system-are a growing problem for many organizations. To address this threat, the... 
insider attacks | network sensors | host-based sensors | decoys | Monitoring | Decoys | Host-based sensors | Network sensors | Insider attacks | COMPUTER SCIENCE, SOFTWARE ENGINEERING | COMPUTER SCIENCE, INFORMATION SYSTEMS | Design engineering | Networks | Correlation | Scaling up | Sensors | Arrays
Journal Article
2011, SpringerBriefs in Computer Science, ISBN 9781441998651, 95
Voice over IP Security examines the current state of affairs on VoIP security through a survey of 221 known/disclosed security vulnerabilities in bug-tracking... 
Applications of Computing | Internet telephony | Internettelefonie
eBook
IEEE Transactions on Dependable and Secure Computing, ISSN 1545-5971, 07/2010, Volume 7, Issue 3, pp. 255 - 270
Journal Article
ACM Transactions on Information and System Security (TISSEC), ISSN 1094-9224, 04/2015, Volume 17, Issue 4, pp. 1 - 27
In the attempt to bring modern broadband Internet features to traditional broadcast television, the Digital Video Broadcasting (DVB) consortium introduced a... 
Smart TV | radio-frequency attacks | relay attacks | Relay attacks | Radio-frequency attacks | Design | COMPUTER SCIENCE, INFORMATION SYSTEMS | Experimentation | Security | Networks | Broadband | Television | Broadcasting | Budgeting | Internet | Computer information security | Exploitation
Journal Article
ACM Transactions on Information and System Security (TISSEC), ISSN 1094-9224, 05/2004, Volume 7, Issue 2, pp. 242 - 273
We describe Just Fast Keying (JFK), a new key-exchange protocol, primarily designed for use in the IP security architecture. It is simple, efficient, and... 
Cryptography | denial-of-service attacks | Denial-of-service attacks
Journal Article
IEEE Security & Privacy, ISSN 1540-7993, 11/2005, Volume 3, Issue 6, pp. 41 - 49
To counter zero-day worms that exploit software flaws such as buffer overflows, this end-point architecture uses source code transformations to automatically... 
Protocols | viruses | Filtering | buffer overflows | Instruments | memory protection | Application software | honeypots | Counting circuits | process sandboxing | software patching | Production | Buffer overflow | Cryptography | Web server | Worms | Testing | COMPUTER SCIENCE, SOFTWARE ENGINEERING | COMPUTER SCIENCE, INFORMATION SYSTEMS
Journal Article
Proceedings of the 22nd ACM SIGSAC Conference on computer and communications security, ISSN 1543-7221, 10/2015, Volume 2015-, pp. 1406 - 1418
We present a micro-architectural side-channel attack that runs entirely in the browser. In contrast to previous work in this genre, our attack does not require... 
javascript-based cache attacks | cache-timing attacks | covert channel | side-channel attacks | user tracking | Covert channel | JavaScript-based cache attacks | User tracking | Cache-timing attacks | Side-channel attacks
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2014, Volume 8362, pp. 247 - 257
Conference Proceeding
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.