Zone Based Systems Design Framework for the Realisation of Efficient Block Cipher Based Message Authentication Code Algorithms. [Citation Graph (, )][DBLP]
A Semantic Security Architecture for Web Services. [Citation Graph (, )][DBLP]
FedWare: Middleware Services to Cope with Information Consistency in Federated Identity Management. [Citation Graph (, )][DBLP]
Owner-Based Role-Based Access Control OB-RBAC. [Citation Graph (, )][DBLP]
Application and Economic Implications of an Automated Requirement-Oriented and Standard-Based Compliance Monitoring and Reporting Prototype. [Citation Graph (, )][DBLP]
A Taxonomy Refining the Security Requirements for Electronic Voting: Analyzing Helios as a Proof of Concept. [Citation Graph (, )][DBLP]
Secured Key Distribution Scheme for Cryptographic Key Management System. [Citation Graph (, )][DBLP]
One Size Fits None: The Importance of Detector Parameterization. [Citation Graph (, )][DBLP]
Supporting Authorization Policy Modification in Agile Development of Web Applications. [Citation Graph (, )][DBLP]
The Road to Hell is Paved with Good Intentions: A Story of (In)secure Software Development. [Citation Graph (, )][DBLP]
Katana: A Hot Patching Framework for ELF Executables. [Citation Graph (, )][DBLP]
Investigating the Limitations of Java Annotations for Input Validation. [Citation Graph (, )][DBLP]
Classification of Buffer Overflow Vulnerability Monitors. [Citation Graph (, )][DBLP]
Configuration Fuzzing for Software Vulnerability Detection. [Citation Graph (, )][DBLP]
Practical Experience Gained from Modeling Security Goals: Using SGITs in an Industrial Project. [Citation Graph (, )][DBLP]
Security Modeling and Tool Support Advantages. [Citation Graph (, )][DBLP]
Analysing and Visualising Security and Usability in IRIS. [Citation Graph (, )][DBLP]
Security and Performance Aspects of an Agent-Based Link-Layer Vulnerability Discovery Mechanism. [Citation Graph (, )][DBLP]
Model-Driven Security Patterns Application Based on Dependences among Patterns. [Citation Graph (, )][DBLP]
Refining the Pattern-Based Reference Model for Electronic Invoices by Incorporating Threats. [Citation Graph (, )][DBLP]
Measuring the Level of Security Introduced by Security Patterns. [Citation Graph (, )][DBLP]
Patterns for Secure Boot and Secure Storage in Computer Systems. [Citation Graph (, )][DBLP]
A Consideration of the Reliability of Registration and Attribute Exchange. [Citation Graph (, )][DBLP]
Binomial-Mix-Based Location Anonymizer System with Global Dummy Generation to Preserve User Location Privacy in Location-Based Services. [Citation Graph (, )][DBLP]
LSM-Based Secure System Monitoring Using Kernel Protection Schemes. [Citation Graph (, )][DBLP]
Formalization of Viruses and Malware Through Process Algebras. [Citation Graph (, )][DBLP]
Heuristics for Detecting Botnet Coordinated Attacks. [Citation Graph (, )][DBLP]
An Improvement of Robustness Against Physical Attacks and Equipment Independence in Information Hiding Based on the Artificial Fiber Pattern. [Citation Graph (, )][DBLP]
Large Scale Demonstration Experiments Towards Acheiving Practical Traceback on the Internet. [Citation Graph (, )][DBLP]
Quantum Detection of Wavelength Division Multiplexing Optical Coherent Signals in Lossy Channels. [Citation Graph (, )][DBLP]
Using Normalized Compression Distance for Classifying File Fragments. [Citation Graph (, )][DBLP]
A Multi-component View of Digital Forensics. [Citation Graph (, )][DBLP]
Blind Steganalysis: A Countermeasure for Binary Image Steganography. [Citation Graph (, )][DBLP]
Log Analysis Towards an Automated Forensic Diagnosis System. [Citation Graph (, )][DBLP]
A Function Oriented Methodology to Validate and Verify Forensic Copy Function of Digital Forensic Tools. [Citation Graph (, )][DBLP]
A Complexity Based Model for Quantifying Forensic Evidential Probabilities. [Citation Graph (, )][DBLP]
A Framework to Guide the Implementation of Proactive Digital Forensics in Organisations. [Citation Graph (, )][DBLP]
Estimating Hidden Message Length in Binary Image Embedded by Using Boundary Pixels Steganography. [Citation Graph (, )][DBLP]
Information Flow Control Using the Java Virtual Machine Tool Interface (JVMTI). [Citation Graph (, )][DBLP]
A Prototype for Support of Computer Forensic Analysis Combined with the Expected Knowledge Level of an Attacker to More Efficiently Achieve Investigation Results. [Citation Graph (, )][DBLP]
A Novel Image Hiding Scheme Using Content Aware Seam Carving Method. [Citation Graph (, )][DBLP]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP