Contributions
�[�AI/Question:�Q4/17�]��� |
�
|
Number�
|
Title
|
Source
|
AI/Question
|
Date
|
|
[ 83 ]
�
� |
Proposal for SISF (Security information sharing framework) documents structure
�
� |
Little eArth Corporation Co., Ltd.
� |
Q4/17
� |
2009-02-04 |
|
[ 79 ]
�
� |
Proposed management capabilities for X.tr-ucc1
�
� |
CATR, MIIT, China
� |
Q4/17
� |
2009-02-03 |
|
[ 78 ]
�
� |
Proposed functional capabilities for X.tb-ucc
�
� |
CATR, MIIT, China
� |
Q4/17
� |
2009-02-03 |
|
[ 77 ]
�
� |
Proposed use cases for X.tb-ucr
�
� |
CATR, MIIT, China
� |
Q4/17
� |
2009-02-03 |
|
[ 76 ]
�
� |
Proposed modification of X.tb-ucc for clause 8.1
�
� |
CATR, MIIT, China
� |
Q4/17
� |
2009-02-03 |
|
[ 75 ]
�
� |
Proposed modification of X.tb-ucc for clause 7.2
�
� |
CATR, MIIT, China
� |
Q4/17
� |
2009-02-03 |
|
[ 74 ]
�
� |
Proposed modification of X.tb-ucc for chapter 6
�
� |
CATR, MIIT, China
� |
Q4/17
� |
2009-02-03 |
|
[ 72 ]
�
� |
Proposal for work relating to trusted network forensics exchange
�
� |
VeriSign
� |
Q4/17
� |
2009-02-03 |
|
[ 67 ]
�
� |
Proposal of new work item on digital evidence exchange file format
�
� |
Korea
� |
Q4/17
� |
2009-02-02 |
|
[ 61 ]
�
� |
Proposed text for clauses 3.2 and 7.1 of draft Recommendation X.gopw
�
� |
Korea
� |
Q4/17
� |
2009-02-02 |
|
[ 59 ]
�
� |
Proposal for a new work item on cyber attack tracing event exchange format (TEEF)
�
� |
Korea
� |
Q4/17
� |
2009-02-02 |
|
[ 55 ]
�
� |
Updated draft text on Recommendation X.tb-ucc : Traceback use cases and capabilities
�
� |
Korea
� |
Q4/17
� |
2009-02-02 |
|
[ 44 ]
�
� |
Considering approval of the CA/Browser Forum specification for extended validation certificates as an ITU-T Recommendation
�
� |
VeriSign
� |
Q4/17, Q12/17, Q11/17, Q10/17
� |
2009-02-02 |
|
[ 15 ]
�
� |
Proposed draft Rec.X.abnot, Abnormal traffic detection and control guideline for telecommunication network
�
� |
China Mobile
,
Huawei
,
ZTE
� |
Q4/17
� |
2009-01-29 |
|
[ 14 ]
�
(Rev.1)� |
Proposal for procedure of abnormal traffic detection and control system
�
� |
ZTE
,
China Mobile
� |
Q4/17
� |
2009-01-29 |
|
[ 13 ]
�
(Rev.1)� |
Proposal for framework of abnormal traffic detection and control system
�
� |
ZTE
,
China Mobile
� |
Q4/17
� |
2009-01-29 |
|
[ 12 ]
�
� |
Proposal on general policy profile for network security
�
� |
ZTE
,
China Mobile
� |
Q4/17
� |
2009-01-29 |
|
[ 11 ]
�
� |
An overview of algorithms used in anomaly detection
�
� |
Huawei
� |
Q4/17
� |
2009-02-02 |
Results:18 total items.
� |
Multiple Document Download:�Formats and Languages to be included (when available):