Feature extraction methods for intrusion detection systems
|
2012 |
Hai Thanh Nguyen |
Distributed key management scheme based on CL-PKC in P2P networks
|
2012 |
Li, Zhongwen |
Security enhancement of peer-to-peer session initiation
|
2012 |
Zheng, Xianghan |
Effective malware analysis using stealth breakpoints
|
2012 |
Vasudevan, Amit |
Graphical passwords
|
2012 |
Catuogno, Luigi |
A decision support system for privacy compliance
|
2012 |
Pearson, Siani |
A privacy service for comparison of privacy and trust policies within SOA
|
2012 |
Allison, David S. |
Creating and applying security goal indicator trees in an industrial environment
|
2012 |
|
Privacy-aware organisation-based access control model (PrivOrBAC)
|
2012 |
Ajam, Nabil |
Embedded system security risk in a green-house environment
|
2012 |
Oraon, Trailokya |
Grid of security : a decentralized enforcement of the network security
|
2012 |
|
A dynamic cyber security economic model : incorporating value functions for all involved parties
|
2012 |
Axelrod, C. Warren |
A distributed and secure architecture for signature and decryption delegation through remote smart cards
|
2012 |
Cattaneo, Giuseppe |
Information security management : awareness of threats in e-commerce
|
2012 |
Rahman, Mohammad Mahfuzur |
Analyzing information security goals
|
2012 |
Kolkowska, Ella |
Towards a framework for collaborative enterprise security
|
2012 |
Misra, Janardan |
Can formal methods really help : analyzing the security of electronic voting systems
|
2012 |
Weldemariam, Komminist |
Countering spam robots : scrambled CAPTCHA and Hindi CAPTCHA
|
2012 |
Raj, Aditya |
Security in wireless sensor networks with mobile codes
|
2012 |
|
A pragmatic approach to intrusion response metrics
|
2012 |
Strasburg, Chris |