𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Unix Vendors Vulnerable to Malicious Attacks

✍ Scribed by Barbara Gengler


Publisher
Elsevier Science
Year
2002
Tongue
English
Weight
117 KB
Volume
2002
Category
Article
ISSN
1353-4858

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


Vulnerability of interconnected power sy
✍ Ettore Bompard; Roberto Napoli; Fei Xue πŸ“‚ Article πŸ“… 2008 πŸ› John Wiley and Sons 🌐 English βš– 255 KB

## Abstract Malicious attacks against critical infrastructures, and power systems as well, became a key‐concern in recent years. The attacks may be both β€œphysical,” directed towards system components, and β€œcyber,” against the information/communication system; simultaneous attacks to different compo

A Fast Data Protection Technique for Mob
✍ JesΓΊs Arturo PΓ©rez DΓ­az; DarΓ­o Álvarez GutiΓ©rrez πŸ“‚ Article πŸ“… 2002 πŸ› Elsevier Science 🌐 English βš– 127 KB

Mobile agents have been considered a promising technology to develop e-commerce applications, however the security concerns about the technology have stopped its widespread use. The identified security areas comprise protecting hosts against malicious agents, protecting the agent's transmission and