Contribuciones
[ AI/Cuestión: Q4/17 ] |
|
Número
|
Título
|
Origen
|
AI/Cuestión
|
Fecha
|
|
[ 460 ]
|
TAP comments on Rec. ITU-T 1570 (X.cybex-disc)
|
France Télécom Orange
|
Q4/17, Q12/17
|
2011-02-08 |
|
[ 458 ]
(Rev.1-2) |
Cybersecurity in developing countries
|
Dem. Rep. of the Congo
|
Q4/17
|
2011-07-28 |
|
[ 457 ]
(Rev.1-2) |
A comment on the draft text for Recommendation ITU-T X.1500.1
|
National Institute of Information and Communications Technology
|
Q4/17, Q12/17
|
2011-07-28 |
|
[ 452 ]
|
Proposal for 3rd Revised draft of X.dexf, Digital forensics exchange format
|
Korea (Republic of)
|
Q4/17
|
2011-03-30 |
|
[ 443 ]
|
Proposal for revised text on draft Recommendation ITU-T X.gopw: Guideline on preventing malicious code spreading in ICT networks "for determination"
|
Korea (Republic of)
|
Q4/17
|
2011-03-30 |
|
[ 439 ]
|
A proposal for revised text on X.tb-ucc: Traceback scenarios and capabilities
|
Korea (Republic of)
|
Q4/17
|
2011-03-30 |
|
[ 438 ]
|
A proposal for the 3rd revised text on draft Recommendation ITU-T X.trm: Traceback mechanisms
|
Korea (Republic of)
|
Q4/17
|
2011-03-30 |
|
[ 434 ]
|
A proposal for the 3rd revised text on draft Recommendation ITU-T X.eipwa: Guideline on techniques for preventing web-based attacks
|
Korea (Republic of)
|
Q4/17
|
2011-03-30 |
|
[ 432 ]
|
A proposal for the 3rd revised text of Recommendation ITU-T X.csi: Guidelines for cybersecurity index
|
Korea (Republic of)
|
Q4/17
|
2011-03-30 |
|
[ 431 ]
|
Proposal for the 1st text on draft Recommendation ITU-T X.sip-cyber: Security guideline for countering cyber attacks in SIP-based services
|
Korea (Republic of)
|
Q4/17
|
2011-03-30 |
|
[ 429 ]
|
Proposal for new work item on a framework of security information sharing negotiation
|
Korea (Republic of)
|
Q4/17
|
2011-03-30 |
|
[ 421 ]
|
Proposed requirement analysis on harmonized telecommunication and Internet services to X.idmcc
|
China Telecom, CATR of MIIT China
|
Q8/17, Q4/17, Q10/17
|
2011-03-30 |
|
[ 419 ]
|
Proposed skeleton for X.idmcc
|
MIIT, China
|
Q8/17, Q4/17, Q10/17
|
2011-03-30 |
|
[ 393 ]
|
Proposed modifications to draft Recommendation X.1521
|
Canada
|
Q4/17
|
2011-03-29 |
|
[ 392 ]
|
Proposed modifications to draft Recommendation X.1520
|
Canada
|
Q4/17
|
2011-03-29 |
|
[ 391 ]
|
Proposal for a standalone Supplement to the X.1500 series of Recommendations
|
Canada
|
Q4/17
|
2011-03-29 |
|
[ 390 ]
|
Additional proposed modifications to draft Recommendation X.1500
|
Canada
|
Q4/17
|
2011-03-28 |
|
[ 389 ]
|
Proposed modifications to draft Recommendation X.1500 Summary and Scope
|
Canada
|
Q4/17
|
2011-03-28 |
|
[ 388 ]
|
Rationale for modification of draft Recommendation X.1500
|
Canada
|
Q4/17
|
2011-03-28 |
|
[ 386 ]
|
COM 17 - R 25 - Draft new Recommendation ITU-T X.1500 (X.cybex), Cybersecurity information exchange techniques - UK proposals
|
UK
|
Q4/17
|
2011-03-28 |
|
[ 385 ]
|
COM 17 - R 26 - Draft new Recommendation ITU-T X.1520 (X.cve), Common vulnerabilities and exposures (CVE) - UK proposals
|
UK
|
Q4/17
|
2011-03-28 |
|
[ 384 ]
|
COM 17 - R 27 Draft new Recommendation ITU-T X.1521 (X.cvss), Common vulnerability scoring system (CVSS) - UK Proposals
|
UK
|
Q4/17
|
2011-03-28 |
|
[ 376 ]
|
Proposed amendments to new Recommendation X.1500 (X.cybex)
|
Administration of the Russian Federation
|
Q4/17
|
2011-03-24 |
|
[ 368 ]
|
Proposal for Revised text on draft Recommendation ITU-T X.dexf: Digital forensics exchange format
|
Korea (Republic of)
|
Q4/17
|
2010-11-29 |
|
[ 358 ]
|
Proposal for revised draft text of draft Recommendation ITU-T X.gopw: Guideline on preventing malicious code spreading in a data communication network
|
Korea (Republic of)
|
Q4/17
|
2010-11-29 |
|
[ 351 ]
|
Proposed draft text for Supplement 8 to Recommendation: ITU-T X.1205 - Supplement on best practices against botnet threats - for approval
|
Korea (Republic of)
|
Q4/17
|
2010-11-26 |
|
[ 349 ]
|
A proposal for the 2nd revised text on draft Recommendation ITU-T X.trm: Traceback mechanisms
|
Korea (Republic of)
|
Q4/17
|
2010-11-26 |
|
[ 348 ]
|
A proposal for the 2nd revised text on draft Recommendation ITU-T X.eipwa: Exchange of information for preventing web-based attacks
|
Korea (Republic of)
|
Q4/17
|
2010-11-26 |
|
[ 347 ]
|
A proposal for revised text on X.tb-ucc: Traceback scenarios and capabilities
|
Korea (Republic of)
|
Q4/17
|
2010-11-26 |
|
[ 345 ]
|
A proposal for the 2nd revised text of Recommendation ITU-T X.csi: Guidelines for cybersecurity index
|
Korea (Republic of)
|
Q4/17
|
2010-11-26 |
|
[ 343 ]
|
Proposal for a new work item on a Security Guideline for countering cyber attacks in SIP-based services
|
Korea (Republic of)
|
Q4/17
|
2010-11-26 |
|
[ 341 ]
|
Proposal for the 3rd revised text on draft Recommendation ITU-T X.sips: A framework for countering cyber attacks in SIP-based services
|
Korea (Republic of)
|
Q4/17
|
2010-11-26 |
|
[ 338 ]
|
Proposal for revised draft text for X.bots: Frameworks for botnet detection and response
|
Korea (Republic of)
|
Q4/17
|
2010-11-26 |
|
[ 326 ]
(Rev.1) |
Proposal for updating "Procedure of security policy distribution" section in X.gpn
|
ZTE, China Mobile
|
Q4/17
|
2010-11-25 |
|
[ 314 ]
|
Proposal for revised draft text for X.bots : Frameworks for botnet detection and response
|
China Unicom
|
Q4/17
|
2010-11-25 |
|
[ 297 ]
|
Proposal for modification on ITU-T Recommendation ITU-T X.1500 [X.cybex], Cybersecurity information exchange framework
|
Germany
|
Q4/17
|
2010-11-25 |
|
[ 290 ]
|
Challenges to open networks: what strategies? Development of a "defense in depth" regulatory framework
|
Information and Communication Technologies
,
Authority of Mauritius
|
Q4/17
|
2010-11-22 |
|
[ 288 ]
|
Enhancing Cybersecurity for Future Networks: automated security use case
|
Yaana Technologies, LLC
|
Q4/17
|
2010-11-09 |
|
[ 286 ]
|
Proposed draft Recommendation ITU-T X.ssaf, Security standards availability framework
|
Yaana Technologies, LLC
|
Q4/17
|
2010-11-05 |
|
[ 254 ]
|
Comparing analysis of abnormal traffic system deployment solutions in X.abnot
|
China Mobile, Huawei
|
Q4/17
|
2010-03-26 |
|
[ 252 ]
|
Proposal for adding chapter 10 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security
|
China Mobile, ZTE
|
Q4/17
|
2010-03-26 |
|
[ 251 ]
|
Proposal for adding chapter 8.3 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security
|
ZTE, China Mobile
|
Q4/17
|
2010-03-26 |
|
[ 245 ]
|
IRC botnet detection
|
Huawei Technologies Co.,Ltd.
|
Q4/17
|
2010-03-26 |
|
[ 244 ]
|
First packet detection for Botnet Detection
|
Huawei Technologies Co.,Ltd.
|
Q4/17
|
2010-03-26 |
|
[ 241 ]
|
A solution to solve the repeated clean problem in the abnormal traffic control system deployment
|
China Mobile, Huawei
|
Q4/17
|
2010-03-26 |
|
[ 238 ]
|
Proposed draft text for Best Practice against Botnets
|
Korea (Republic of) and Japan
|
Q4/17, Q1/17
|
2010-03-26 |
|
[ 228 ]
|
Revised draft Recommendation on X.gopw: Guideline on preventing malicious code spreading in a data communication network
|
Korea (Republic of)
|
Q4/17
|
2010-03-26 |
|
[ 223 ]
|
A proposal for the 1st revised text on draft Recommendation ITU-T X.trm: Traceback mechanisms
|
Korea (Republic of)
|
Q4/17
|
2010-03-26 |
|
[ 222 ]
|
A proposal for the 1st revised text on ITU-T draft Recommendation X.eipwa: Exchange of Information for preventing web-based attacks
|
Korea (Republic of)
|
Q4/17
|
2010-03-26 |
|
[ 221 ]
|
A proposal for revised text on draft Recommendation ITU-T X.tb-ucc: Traceback use cases and capabilities
|
Korea (Republic of)
|
Q4/17
|
2010-03-26 |
Resultados :152 documentos Resultados :
Anterior -
1 -
2 -
3 -
4
- Siguiente
|
Telecarga de múltiples documentos: Formatos e idiomas que hay que tener en cuenta (si están disponibles):