85 results on '"Yurcik, W."'
Search Results
52. A survivability framework for connection-oriented group communications
53. Providing guaranteed assurance to connection-oriented group communications using disjoint routing
54. A virtual private network deployment framework
55. Closing-the-loop: discovery and search in security visualizations
56. Scalable survivable ATM group communications
57. Closing-the-Loop in NVisionIP: Integrating Discovery and Search in Security Visualizations
58. The educational range of visual simulations of the Little Man Computer architecture paradigm
59. A crowd of Little Man Computers: visual computer simulator teaching tools
60. Trade-Offs in Protecting Storage: A Meta-Data Comparison of Cryptographic, Backup/Versioning, Immutable/Tamper-Proof, and Redundant Storage Solutions
61. Closing-the-loop in NVisionIP: integrating discovery and search in security visualizations
62. Internet honeypots: protection or entrapment?
63. A visualization tool for situational awareness of tactical and strategic security events on large and complex computer networks
64. A layered framework strategy for deploying high assurance VPNs
65. A cluster process monitoring tool for intrusion detection: proof-of-concept.
66. BEASTS: an enterprise management tool for providing information survivability in dynamic heterogeneous networked environments.
67. Controlling intrusion detection systems by generating false positives: squealing proof-of-concept.
68. Application-level survivable software: rFTP proof-of-concept.
69. Network management visualization with PingTV.
70. Providing guaranteed assurance to connection-oriented group communications using disjoint routing.
71. A virtual private network deployment framework.
72. Open source versus commercial firewalls: functional comparison.
73. Distributed weakness in virtual private networks.
74. Byzantine Anomaly Testing for Charm++: Providing Fault Tolerance and Survivability for Charm++ Empowered Clusters.
75. A survey of PKI components and scalability issues.
76. Multiple design patterns for voice over IP (VoIP) security.
77. Searching for open windows and unlocked doors: port scanning in large-scale commodity clusters.
78. Cluster security with NVisionCC: process monitoring by leveraging emergent properties.
79. A first step toward detecting SSH identity theft in HPC cluster environments: discriminating masqueraders based on command behavior.
80. NVisionIP: an interactive network flow visualization tool for security.
81. A visualization tool for situational awareness of tactical and strategic security events on large and complex computer networks.
82. The educational range of visual simulations of the Little Man Computer architecture paradigm.
83. Application-level survivability: resumable FTP.
84. A crowd of Little Man Computers: visual computer simulator teaching tools.
85. Scalable survivable ATM group communications.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.