Contributions
[ AI/Question: Q4/17 ] |
|
Number
|
Title
|
Source
|
AI/Question
|
Date
|
|
[ 83 ]
|
Proposal for SISF (Security information sharing framework) documents structure
|
Little eArth Corporation Co., Ltd.
|
Q4/17
|
2009-02-04 |
|
[ 79 ]
|
Proposed management capabilities for X.tr-ucc1
|
CATR, MIIT, China
|
Q4/17
|
2009-02-03 |
|
[ 78 ]
|
Proposed functional capabilities for X.tb-ucc
|
CATR, MIIT, China
|
Q4/17
|
2009-02-03 |
|
[ 77 ]
|
Proposed use cases for X.tb-ucr
|
CATR, MIIT, China
|
Q4/17
|
2009-02-03 |
|
[ 76 ]
|
Proposed modification of X.tb-ucc for clause 8.1
|
CATR, MIIT, China
|
Q4/17
|
2009-02-03 |
|
[ 75 ]
|
Proposed modification of X.tb-ucc for clause 7.2
|
CATR, MIIT, China
|
Q4/17
|
2009-02-03 |
|
[ 74 ]
|
Proposed modification of X.tb-ucc for chapter 6
|
CATR, MIIT, China
|
Q4/17
|
2009-02-03 |
|
[ 72 ]
|
Proposal for work relating to trusted network forensics exchange
|
VeriSign
|
Q4/17
|
2009-02-03 |
|
[ 67 ]
|
Proposal of new work item on digital evidence exchange file format
|
Korea
|
Q4/17
|
2009-02-02 |
|
[ 61 ]
|
Proposed text for clauses 3.2 and 7.1 of draft Recommendation X.gopw
|
Korea
|
Q4/17
|
2009-02-02 |
|
[ 59 ]
|
Proposal for a new work item on cyber attack tracing event exchange format (TEEF)
|
Korea
|
Q4/17
|
2009-02-02 |
|
[ 55 ]
|
Updated draft text on Recommendation X.tb-ucc : Traceback use cases and capabilities
|
Korea
|
Q4/17
|
2009-02-02 |
|
[ 44 ]
|
Considering approval of the CA/Browser Forum specification for extended validation certificates as an ITU-T Recommendation
|
VeriSign
|
Q4/17, Q12/17, Q11/17, Q10/17
|
2009-02-02 |
|
[ 15 ]
|
Proposed draft Rec.X.abnot, Abnormal traffic detection and control guideline for telecommunication network
|
China Mobile
,
Huawei
,
ZTE
|
Q4/17
|
2009-01-29 |
|
[ 14 ]
(Rev.1) |
Proposal for procedure of abnormal traffic detection and control system
|
ZTE
,
China Mobile
|
Q4/17
|
2009-01-29 |
|
[ 13 ]
(Rev.1) |
Proposal for framework of abnormal traffic detection and control system
|
ZTE
,
China Mobile
|
Q4/17
|
2009-01-29 |
|
[ 12 ]
|
Proposal on general policy profile for network security
|
ZTE
,
China Mobile
|
Q4/17
|
2009-01-29 |
|
[ 11 ]
|
An overview of algorithms used in anomaly detection
|
Huawei
|
Q4/17
|
2009-02-02 |
Results:18 total items.
|
Multiple Document Download: Formats and Languages to be included (when available):