ќ каналах скрытых, потайных, побочных


Ћитература - часть 3


[25] V. Roth , U. Pinsdorf , J. Peters -- A Distributed Content-Based Search Engine Based on Mobile Code. Ч Proceedings of the 2005 ACM Symposium on Applied Computing (SAC'05). -- ACM, 2005

[26] M. Carvalho , T. Cowin , N. Suri , M. Breedy , K. Ford -- Using Mobile Agents as Roaming Security Guards to Test and Improve Security of Hosts and Networks. Ч Proceedings of the 2004 ACM Symposium on Applied Computing (SAC'04). -- ACM, 2004

[27] T. Pedireddy , J.M. Vidal -- A Prototype MultiAgent Network Security System. Ч Proceedings of the AAMAS'03. -- ACM, 2003

[28] R. Menezes -- Self-Organization and Computer Security. Ч Proceedings of the 2005 ACM Symposium on Applied Computing (SAC'05). -- ACM, 2005

[29] J. Page , A. Zaslavsky , M. Indrawan -- Countering Agent Security Vulnerabilities using an Extended SENSE Schema. Ч Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT'04). -- IEEE, 2004

[30] J. Page , A. Zaslavsky , M. Indrawan -- Countering Security Vulnerabilities in Agent Execution using a Self Sxecuting Security Examination. Ч Proceedings of the AAMAS'04. -- ACM, 2004

[31] J. Ameiller , S. Robles , J.A. Ortega-Ruiz -- Self-Protected Mobile Agents. Ч Proceedings of the AAMAS'04. -- ACM, 2004

[32] M. Christodorescu , S. Jha -- Testing Malware Detectors. Ч Proceedings of the ISSTA'04. -- ACM, 2004

[33] M. Christodorescu , S. Jha , S.A. Seshia , D. Song , R.E. Bryant -- Semantics-Aware Malware Detection. Ч Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P'05). -- IEEE, 2005

[34] J.A.M. McHugh , F.P. Deek -- An Incentive System for Reducing Malware Attacks. -- Communications of the ACM, 2005, 6

[35] J.V. Harrison -- Enhancing Network Security By Preventing User-Initiated Malware Execution. Ч Proceedings of the International Conference on Information Technology Coding and Computing (ITCC'05). -- IEEE, 2005

[36] A. Bohra , I. Neamtiu , P. Gallard , F. Sultan , L. Iftode -- Remote Repair of Operating System State Using Backdoors.


Ќачало  Ќазад  ¬перед



 нижный магазин