Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

5 results
publicationDateY_i : 2015
Image document

Automated Translation of End User Policies for Usage Control Enforcement

Prachi Kumari , Alexander Pretschner
29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.250-258, ⟨10.1007/978-3-319-20810-7_18⟩
Conference papers hal-01745828v1
Image document

The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire

Johann Schlamp , Josef Gustafsson , Matthias Wählisch , Thomas C. Schmidt , Georg Carle
7th Workshop on Traffic Monitoring and Analysis (TMA), Apr 2015, Barcelona, Spain. pp.188-201, ⟨10.1007/978-3-319-17172-2_13⟩
Conference papers hal-01411194v1
Image document

DoS Amplification Attacks – Protocol-Agnostic Detection of Service Abuse in Amplifier Networks

Timm Böttger , Lothar Braun , Oliver Gasser , Felix Von Eye , Helmut Reiser , et al.
7th Workshop on Traffic Monitoring and Analysis (TMA), Apr 2015, Barcelona, Spain. pp.205-218, ⟨10.1007/978-3-319-17172-2_14⟩
Conference papers hal-01411196v1
Image document

Why Realization Mismatches Expectations of e-Government Project Benefits? Towards Benefit Realization Planning

Dian Balta , Vanessa Greger , Petra Wolf , Helmut Krcmar
14th International Conference on Electronic Government (EGOV), Aug 2015, Thessaloniki, Greece. pp.233-245, ⟨10.1007/978-3-319-22479-4_18⟩
Conference papers hal-01412274v1
Image document

Investigating the Nature of Routing Anomalies: Closing in on Subprefix Hijacking Attacks

Johann Schlamp , Ralph Holz , Oliver Gasser , Andreas Korsten , Quentin Jacquemart , et al.
7th Workshop on Traffic Monitoring and Analysis (TMA), Apr 2015, Barcelona, Spain. pp.173-187, ⟨10.1007/978-3-319-17172-2_12⟩
Conference papers hal-01411193v1