|
Journals in DBLP
- Weisong Shi, Cheng-Zhong Xu, Xiaobo Zhou
Special issue: Security in grid and distributed systems. [Citation Graph (0, 0)][DBLP] J. Parallel Distrib. Comput., 2006, v:66, n:9, pp:1113-1115 [Journal]
- Chenghuai Lu, Tao Zhang, Weidong Shi, Hsien-Hsin S. Lee
M-TREE: A high efficiency security architecture for protecting integrity and privacy of software. [Citation Graph (0, 0)][DBLP] J. Parallel Distrib. Comput., 2006, v:66, n:9, pp:1116-1128 [Journal]
- Zili Shao, Jiannong Cao, Keith C. C. Chan, Chun Xue, Edwin Hsing-Mean Sha
Hardware/software optimization for array & pointer boundary checking against buffer overflow attacks. [Citation Graph (0, 0)][DBLP] J. Parallel Distrib. Comput., 2006, v:66, n:9, pp:1129-1136 [Journal]
- Yu Chen, Kai Hwang
Collaborative detection and filtering of shrew DDoS attacks using spectral analysis. [Citation Graph (0, 0)][DBLP] J. Parallel Distrib. Comput., 2006, v:66, n:9, pp:1137-1151 [Journal]
- Sherif M. Khattab, Rami G. Melhem, Daniel Mossé, Taieb Znati
Honeypot back-propagation for mitigating spoofing distributed Denial-of-Service attacks. [Citation Graph (0, 0)][DBLP] J. Parallel Distrib. Comput., 2006, v:66, n:9, pp:1152-1164 [Journal]
- Xuxian Jiang, Dongyan Xu, Yi-Min Wang
Collapsar: A VM-based honeyfarm and reverse honeyfarm architecture for network attack capture and detention. [Citation Graph (0, 0)][DBLP] J. Parallel Distrib. Comput., 2006, v:66, n:9, pp:1165-1180 [Journal]
- Paul Lu, Michael Closson, Cam Macdonell, Paul Nalos, Danny Ngo, Morgan Kan, Mark Lee
The Trellis security infrastructure for overlay metacomputers and bridged distributed file systems. [Citation Graph (0, 0)][DBLP] J. Parallel Distrib. Comput., 2006, v:66, n:9, pp:1181-1188 [Journal]
- Matthew Smith, Thomas Friese, Michael Engel, Bernd Freisleben
Countering security threats in service-oriented on-demand grid computing using sandboxing and trusted computing techniques. [Citation Graph (0, 0)][DBLP] J. Parallel Distrib. Comput., 2006, v:66, n:9, pp:1189-1204 [Journal]
- Li Xiao, Yunhao Liu, Wenjun Gu, Dong Xuan, Xiaomei Liu
Mutual anonymous overlay multicast. [Citation Graph (0, 0)][DBLP] J. Parallel Distrib. Comput., 2006, v:66, n:9, pp:1205-1216 [Journal]
- Mudhakar Srivatsa, Ling Liu
Securing decentralized reputation management using TrustGuard. [Citation Graph (0, 0)][DBLP] J. Parallel Distrib. Comput., 2006, v:66, n:9, pp:1217-1232 [Journal]
- Ori Dvir, Maurice Herlihy, Nir Shavit
Virtual Leashing: Creating a computational foundation for software protection. [Citation Graph (0, 0)][DBLP] J. Parallel Distrib. Comput., 2006, v:66, n:9, pp:1233-1240 [Journal]
|