|
Conferences in DBLP
- Juan B. Gómez, Paloma Cáceres, José María Cavero, Esperanza Marcos, J. Pérez
Security in Web Database Systems Development. [Citation Graph (0, 0)][DBLP] SIS, 2002, pp:1-12 [Conf]
- José Fernando Carvajal Vión
Computer Immune System: An overview - creating a cyberimmune operating system. [Citation Graph (0, 0)][DBLP] SIS, 2002, pp:13-24 [Conf]
- Eduardo Fernández-Medina, Mario Piattini
UML for the Design of Secure Databases. [Citation Graph (0, 0)][DBLP] SIS, 2002, pp:25-38 [Conf]
- Jarkko Holappa
Java Application Signature, Integrity Verification and Server Authentication Mechanism in MExE Terminal. [Citation Graph (0, 0)][DBLP] SIS, 2002, pp:39-52 [Conf]
- Mohammed Alhussein, Khaled Al-Ghoneim
Real-Time Network Intrusion Detection System Based on Neural Networks. [Citation Graph (0, 0)][DBLP] SIS, 2002, pp:53-60 [Conf]
- Javier Lopez, Juan J. Ortega, José M. Troya
Verification of Authentication Protocols using SDL-method. [Citation Graph (0, 0)][DBLP] SIS, 2002, pp:61-71 [Conf]
- Miguel F. Bañón Puente
The PKI Secure Kernel Protection Profile. [Citation Graph (0, 0)][DBLP] SIS, 2002, pp:72-80 [Conf]
- Janusz R. Getta
Scrambling Covert Channels in Multilevel Secure Database Systems. [Citation Graph (0, 0)][DBLP] SIS, 2002, pp:81-93 [Conf]
|