Multi-agent systems

Results: 1893



#Item
971Protect Yourself in the Cloud Age Matthew Wu Consultant Hong Kong Computer Emergency Response Team Coordination Centre

Protect Yourself in the Cloud Age Matthew Wu Consultant Hong Kong Computer Emergency Response Team Coordination Centre

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2014-03-07 05:30:59
972   Information Security Animations - Zombies and Botnets (Script) What is a Zombie? Zombie computer (Zombie or Bot) is a computer connected to the Internet that has been compromised

  Information Security Animations - Zombies and Botnets (Script) What is a Zombie? Zombie computer (Zombie or Bot) is a computer connected to the Internet that has been compromised

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2011-03-29 08:16:54
973Microsoft PowerPoint - 3. HKCERT Trend.ppt

Microsoft PowerPoint - 3. HKCERT Trend.ppt

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2011-03-29 08:09:30
974Microsoft PowerPoint - 4. HKCERT - School Information and Server security_201106.ppt

Microsoft PowerPoint - 4. HKCERT - School Information and Server security_201106.ppt

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2011-08-31 06:18:10
975Microsoft PowerPoint - 1. HKCERT_isp_symposium_20100720final.ppt

Microsoft PowerPoint - 1. HKCERT_isp_symposium_20100720final.ppt

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2010-11-13 10:14:26
976CERT.at Technical Report  CERT.at Technical Report An	
  Analysis	
  of	
  the	
  Skype	
  IMBot	
  Logic	
  and	
  Functionality	
   Release Date: [removed]Last Updated: [removed], public version 1.2

CERT.at Technical Report CERT.at Technical Report An  Analysis  of  the  Skype  IMBot  Logic  and  Functionality   Release Date: [removed]Last Updated: [removed], public version 1.2

Add to Reading List

Source URL: www.cert.at

Language: English - Date: 2015-03-06 12:17:44
977arXiv:nlin.AO[removed]v2 30 Apr[removed]Chapter 1 Protocol Requirements for Self-organizing Artifacts:

arXiv:nlin.AO[removed]v2 30 Apr[removed]Chapter 1 Protocol Requirements for Self-organizing Artifacts:

Add to Reading List

Source URL: cleamc11.vub.ac.be

Language: English - Date: 2014-05-02 12:27:43
978Customer Story  Bibliotheek Rotterdam Location Rotterdam, Netherlands Industry

Customer Story Bibliotheek Rotterdam Location Rotterdam, Netherlands Industry

Add to Reading List

Source URL: www.threatstop.com

Language: English - Date: 2012-12-27 17:11:43
9792015 Spring Simulation Multi-Conference (SpringSim[removed]April[removed], 2015 | Alexandria, USA ** Call For Papers ** 2015 Agent-Directed Simulation (ADS’15) Symposium General Chair: Levent Yilmaz, [removed]

2015 Spring Simulation Multi-Conference (SpringSim[removed]April[removed], 2015 | Alexandria, USA ** Call For Papers ** 2015 Agent-Directed Simulation (ADS’15) Symposium General Chair: Levent Yilmaz, [removed]

Add to Reading List

Source URL: scs.org

Language: English - Date: 2014-06-18 21:35:51
980Customer Story  University of Baltimore Customer Overview Location

Customer Story University of Baltimore Customer Overview Location

Add to Reading List

Source URL: www.threatstop.com

Language: English - Date: 2012-12-27 17:11:43