The SCEAS System
Navigation Menu

Conferences in DBLP

Security in Information Systems (sis)
2002 (conf/sis/2002)

  1. Juan B. Gómez, Paloma Cáceres, José María Cavero, Esperanza Marcos, J. Pérez
    Security in Web Database Systems Development. [Citation Graph (0, 0)][DBLP]
    SIS, 2002, pp:1-12 [Conf]
  2. José Fernando Carvajal Vión
    Computer Immune System: An overview - creating a cyberimmune operating system. [Citation Graph (0, 0)][DBLP]
    SIS, 2002, pp:13-24 [Conf]
  3. Eduardo Fernández-Medina, Mario Piattini
    UML for the Design of Secure Databases. [Citation Graph (0, 0)][DBLP]
    SIS, 2002, pp:25-38 [Conf]
  4. Jarkko Holappa
    Java Application Signature, Integrity Verification and Server Authentication Mechanism in MExE Terminal. [Citation Graph (0, 0)][DBLP]
    SIS, 2002, pp:39-52 [Conf]
  5. Mohammed Alhussein, Khaled Al-Ghoneim
    Real-Time Network Intrusion Detection System Based on Neural Networks. [Citation Graph (0, 0)][DBLP]
    SIS, 2002, pp:53-60 [Conf]
  6. Javier Lopez, Juan J. Ortega, José M. Troya
    Verification of Authentication Protocols using SDL-method. [Citation Graph (0, 0)][DBLP]
    SIS, 2002, pp:61-71 [Conf]
  7. Miguel F. Bañón Puente
    The PKI Secure Kernel Protection Profile. [Citation Graph (0, 0)][DBLP]
    SIS, 2002, pp:72-80 [Conf]
  8. Janusz R. Getta
    Scrambling Covert Channels in Multilevel Secure Database Systems. [Citation Graph (0, 0)][DBLP]
    SIS, 2002, pp:81-93 [Conf]
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002