Filters








3 Hits in 2.2 sec

Evaluation des systèmes de détection d'intrusions

-Anas -ABOU EL KALAM
2006 Revue de l Electricité et de l Electronique  
This Bagle variant spreads either as Windows PE EXE file or a Windows Control Panel Applet (CPL) file, both about 20 KB in size.  ...  For example, it cannot detect attacks carried out locally that have no manifestations on the network card (e.g., attacks executed by a local user from the console).  ...  Attack A malicious technical interaction that attempts to exploit some vulnerability as a step towards achieving the final goal of the attacker.  ... 
doi:10.3845/ree.2006.102 fatcat:erwecavq3zh33o3b5aemi5q5gm

A technical approach to privacy based on mobile agents protected by tamper-resistant hardware

Uwe Georg Wilhelm
2005
The notification informs individuals who is using what information on them and allows to detect possible problems with this use.  ...  We address the problem of protecting the privacy of individuals in the information society.  ...  (This approach has actually been realized by certain Web browsers in the context of signed Java applets.)  ... 
doi:10.5075/epfl-thesis-1961 fatcat:wu3wyhb6xnbnjmkalsgmqpxtb4

Collaborative domains in internet environments

Eduardo Solana, Jose Rolim
2007
This work is also the result of the invaluable experience acquired in this outstanding company.  ...  Thanks go also to all my ex-colleagues from PricewaterhouseCoopers and in particular to the Global Subject Matter Expert Group and to the Cryptographic Center of Excellence to which I was honored to belong  ...  script execution: Scripts are downloaded from the manager and executed in the neighbour domain platform (java applet, active-x, PerlREX (See section §4.4.2) etc.).  ... 
doi:10.13097/archive-ouverte/unige:480 fatcat:wg33edw7ozcp5bp34xjbfmy5ri