Article
Licensed
Unlicensed
Requires Authentication
Reactive Security
-
Ulrich Flegel
Published/Copyright:
March 20, 2012
Published Online: 2012-03-20
Published in Print: 2012-04
© by Oldenbourg Wissenschaftsverlag, Stuttgart, Germany
You are currently not able to access this content.
You are currently not able to access this content.
Articles in the same Issue
- Reactive Security
- Reverse Code Engineering — State of the Art and Countermeasures
- Platform-Independent Recognition of Procedures in Binaries Based on Simple Characteristics
- Modeling and Describing Misuse Scenarios Using Signature-Nets and Event Description Language
- Anomaly Detection at “supersonic” Speed
- Experiments with P2P Botnet Detection
- Automatic Adaptation of User Interfaces to Cultural Preferences
Articles in the same Issue
- Reactive Security
- Reverse Code Engineering — State of the Art and Countermeasures
- Platform-Independent Recognition of Procedures in Binaries Based on Simple Characteristics
- Modeling and Describing Misuse Scenarios Using Signature-Nets and Event Description Language
- Anomaly Detection at “supersonic” Speed
- Experiments with P2P Botnet Detection
- Automatic Adaptation of User Interfaces to Cultural Preferences