Contributions
[ AI/Question: Q4/17 ] |
|
Number
|
Title
|
Source
|
AI/Question
|
Date
|
|
[ 631 ]
(Rev.1) |
Proposal for modifying the response architecture of X.bots
|
Hitachi, Ltd.
,
KDDI Corporation
|
Q7/17, Q4/17
|
2012-02-07 |
|
[ 606 ]
|
The 5th revised text of Recommendation ITU-T X.csi: Guidelines for cybersecurity index
|
Korea (Rep. of)
|
Q4/17
|
2012-02-07 |
|
[ 605 ]
|
The 5th revised text on draft Recommendation ITU-T X.trm: Overview of traceback mechanisms
|
Korea (Rep. of)
|
Q4/17
|
2012-02-07 |
|
[ 604 ]
|
The 5th revised text on draft Recommendation ITU-T X.eipwa: Guideline on techniques for preventing web-based attacks
|
Korea (Rep. of)
|
Q4/17
|
2012-02-07 |
|
[ 587 ]
|
Interface of the abnormal traffic detection and control system
|
China Mobile Communications Corporation
,
Huawei Technologies Co. Ltd.
|
Q4/17
|
2012-02-07 |
|
[ 574 ]
|
Improving Intrusion Detection Systems with Hierarchical Architecture Using an Inter layer Messaging System
|
Ministry of Information and Communication Technology (MICT)
|
Q4/17
|
2012-02-07 |
|
[ 572 ]
|
Withdrawn
|
N/A
|
Q4/17
|
2012-02-07 |
|
[ 571 ]
|
A New Architecture for Redirecting Intruders to Honeypots
|
Ministry of Information and Communication Technology (MICT)
|
Q4/17
|
2012-02-07 |
|
[ 556 ]
(Rev.1) |
UK Comments on COM 17 - R 44 - E Draft Recommendation ITU-T X.1541 (X.iodef), Incident object description exchange format
|
United Kingdom
|
Q4/17
|
2012-02-04 |
|
[ 555 ]
(Rev.1) |
UK Comments on COM 17 - R 43 - E - Draft Recommendation ITU-T X.1524, X.cwe, Common weakness enumeration (CWE)
|
United Kingdom
|
Q4/17
|
2012-02-04 |
|
[ 551 ]
|
Improving Intrusion Detection Systems with Hierarchical Architecture Using an Interlayer Messaging System
|
Iran (Islamic Republic of)
|
Q4/17
|
2012-01-31 |
|
[ 549 ]
(Rev.1-3) |
Guidelines on the safety of mobile phone banking (M-Banking)
|
Autorité de Régulation de la Poste et des Télécommunications du
|
Q4/17
|
2012-01-11 |
|
[ 538 ]
(Rev.1) |
Proposed new work item - ITU-T X.cvrf, Common Vulnerability Reporting Framework
|
Cisco Systems, Inc.
|
Q4/17
|
2011-08-11 |
|
[ 512 ]
|
Proposal for a new work item: Technologies Involved in Countering Voice Spam in Telecommunication Organizations
|
China Mobile Communications Corporation
|
Q5/17, Q4/17
|
2011-08-10 |
|
[ 511 ]
|
Proposal for a new work item: Guidelines on the Infected Terminals Management in Mobile Networks
|
China Mobile Communications Corporation
|
Q4/17
|
2011-08-10 |
|
[ 509 ]
|
Performance and Interface of the abnormal traffic detection and control system
|
China Mobile Communications Corporation
,
Huawei Technologies Co. Ltd.
|
Q4/17
|
2011-08-10 |
|
[ 504 ]
|
Comments on X.1570
|
Canada
|
Q4/17
|
2011-08-09 |
|
[ 503 ]
|
Comments on TD 1979 draft Recommendation X.rid
|
Canada
|
Q4/17
|
2011-08-09 |
|
[ 500 ]
|
Comments on draft Recommendation X.1211
|
Canada
|
Q4/17
|
2011-08-09 |
|
[ 487 ]
|
Proposal for revised draft text for X.bot : Centralized Framework for Botnet detection and response
|
Korea (Rep. of)
|
Q4/17
|
2011-08-08 |
|
[ 480 ]
|
Proposal for revised text on draft Recommendation X.1205 Sup.9 : Guidelines for reducing malware in ICT networks "for approval"
|
Korea (Rep. of)
|
Q4/17
|
2011-08-08 |
|
[ 472 ]
|
A proposal for the 4th revised text on draft Recommendation ITU-T X.trm: Overview of traceback mechanisms
|
Korea (Rep. of)
|
Q4/17
|
2011-08-08 |
|
[ 469 ]
|
A proposal for the 4th revised text on draft Recommendation ITU-T X.eipwa: Guideline on techniques for preventing web-based attacks
|
Korea (Rep. of)
|
Q4/17
|
2011-08-08 |
|
[ 468 ]
|
A proposal for the 4th revised text of Recommendation ITU-T X.csi: Guidelines for cybersecurity index
|
Korea (Rep. of)
|
Q4/17
|
2011-08-08 |
|
[ 465 ]
|
Proposal for initial draft of X.sisnego, framework of security information sharing negotiation
|
Korea (Rep. of)
|
Q4/17
|
2011-08-08 |
|
[ 460 ]
|
TAP comments on Rec. ITU-T 1570 (X.cybex-disc)
|
France Télécom Orange
|
Q4/17, Q12/17
|
2011-02-08 |
|
[ 458 ]
(Rev.1-2) |
Cybersecurity in developing countries
|
Dem. Rep. of the Congo
|
Q4/17
|
2011-07-28 |
|
[ 457 ]
(Rev.1-2) |
A comment on the draft text for Recommendation ITU-T X.1500.1
|
National Institute of Information and Communications Technology
|
Q4/17, Q12/17
|
2011-07-28 |
|
[ 452 ]
|
Proposal for 3rd Revised draft of X.dexf, Digital forensics exchange format
|
Korea (Republic of)
|
Q4/17
|
2011-03-30 |
|
[ 443 ]
|
Proposal for revised text on draft Recommendation ITU-T X.gopw: Guideline on preventing malicious code spreading in ICT networks "for determination"
|
Korea (Republic of)
|
Q4/17
|
2011-03-30 |
|
[ 439 ]
|
A proposal for revised text on X.tb-ucc: Traceback scenarios and capabilities
|
Korea (Republic of)
|
Q4/17
|
2011-03-30 |
|
[ 438 ]
|
A proposal for the 3rd revised text on draft Recommendation ITU-T X.trm: Traceback mechanisms
|
Korea (Republic of)
|
Q4/17
|
2011-03-30 |
|
[ 434 ]
|
A proposal for the 3rd revised text on draft Recommendation ITU-T X.eipwa: Guideline on techniques for preventing web-based attacks
|
Korea (Republic of)
|
Q4/17
|
2011-03-30 |
|
[ 432 ]
|
A proposal for the 3rd revised text of Recommendation ITU-T X.csi: Guidelines for cybersecurity index
|
Korea (Republic of)
|
Q4/17
|
2011-03-30 |
|
[ 431 ]
|
Proposal for the 1st text on draft Recommendation ITU-T X.sip-cyber: Security guideline for countering cyber attacks in SIP-based services
|
Korea (Republic of)
|
Q4/17
|
2011-03-30 |
|
[ 429 ]
|
Proposal for new work item on a framework of security information sharing negotiation
|
Korea (Republic of)
|
Q4/17
|
2011-03-30 |
|
[ 421 ]
|
Proposed requirement analysis on harmonized telecommunication and Internet services to X.idmcc
|
China Telecom, CATR of MIIT China
|
Q8/17, Q4/17, Q10/17
|
2011-03-30 |
|
[ 419 ]
|
Proposed skeleton for X.idmcc
|
MIIT, China
|
Q8/17, Q4/17, Q10/17
|
2011-03-30 |
|
[ 393 ]
|
Proposed modifications to draft Recommendation X.1521
|
Canada
|
Q4/17
|
2011-03-29 |
|
[ 392 ]
|
Proposed modifications to draft Recommendation X.1520
|
Canada
|
Q4/17
|
2011-03-29 |
|
[ 391 ]
|
Proposal for a standalone Supplement to the X.1500 series of Recommendations
|
Canada
|
Q4/17
|
2011-03-29 |
|
[ 390 ]
|
Additional proposed modifications to draft Recommendation X.1500
|
Canada
|
Q4/17
|
2011-03-28 |
|
[ 389 ]
|
Proposed modifications to draft Recommendation X.1500 Summary and Scope
|
Canada
|
Q4/17
|
2011-03-28 |
|
[ 388 ]
|
Rationale for modification of draft Recommendation X.1500
|
Canada
|
Q4/17
|
2011-03-28 |
|
[ 386 ]
|
COM 17 - R 25 - Draft new Recommendation ITU-T X.1500 (X.cybex), Cybersecurity information exchange techniques - UK proposals
|
UK
|
Q4/17
|
2011-03-28 |
|
[ 385 ]
|
COM 17 - R 26 - Draft new Recommendation ITU-T X.1520 (X.cve), Common vulnerabilities and exposures (CVE) - UK proposals
|
UK
|
Q4/17
|
2011-03-28 |
|
[ 384 ]
|
COM 17 - R 27 Draft new Recommendation ITU-T X.1521 (X.cvss), Common vulnerability scoring system (CVSS) - UK Proposals
|
UK
|
Q4/17
|
2011-03-28 |
|
[ 376 ]
|
Proposed amendments to new Recommendation X.1500 (X.cybex)
|
Administration of the Russian Federation
|
Q4/17
|
2011-03-24 |
|
[ 368 ]
|
Proposal for Revised text on draft Recommendation ITU-T X.dexf: Digital forensics exchange format
|
Korea (Republic of)
|
Q4/17
|
2010-11-29 |
|
[ 358 ]
|
Proposal for revised draft text of draft Recommendation ITU-T X.gopw: Guideline on preventing malicious code spreading in a data communication network
|
Korea (Republic of)
|
Q4/17
|
2010-11-29 |
Results:152 total items. Result page:
-
1 -
2 -
3 -
4
- Next
|
Multiple Document Download: Formats and Languages to be included (when available):