|
Conferences in DBLP
Automated xacml policy reconfiguration for evaluation optimisation. [Citation Graph (, )][DBLP]
Introducing privacy in a hospital information system. [Citation Graph (, )][DBLP]
From security patterns to implementation using petri nets. [Citation Graph (, )][DBLP]
SAVE: static analysis on versioning entities. [Citation Graph (, )][DBLP]
Security protocols, properties, and their monitoring. [Citation Graph (, )][DBLP]
LISABETH: automated content-based signature generator for zero-day polymorphic worms. [Citation Graph (, )][DBLP]
Proposing SQL statement coverage metrics. [Citation Graph (, )][DBLP]
Security metrics for source code structures. [Citation Graph (, )][DBLP]
|