The SCEAS System
Navigation Menu

Journals in DBLP

J. Parallel Distrib. Comput.
2006, volume: 66, number: 9

  1. Weisong Shi, Cheng-Zhong Xu, Xiaobo Zhou
    Special issue: Security in grid and distributed systems. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2006, v:66, n:9, pp:1113-1115 [Journal]
  2. Chenghuai Lu, Tao Zhang, Weidong Shi, Hsien-Hsin S. Lee
    M-TREE: A high efficiency security architecture for protecting integrity and privacy of software. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2006, v:66, n:9, pp:1116-1128 [Journal]
  3. Zili Shao, Jiannong Cao, Keith C. C. Chan, Chun Xue, Edwin Hsing-Mean Sha
    Hardware/software optimization for array & pointer boundary checking against buffer overflow attacks. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2006, v:66, n:9, pp:1129-1136 [Journal]
  4. Yu Chen, Kai Hwang
    Collaborative detection and filtering of shrew DDoS attacks using spectral analysis. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2006, v:66, n:9, pp:1137-1151 [Journal]
  5. Sherif M. Khattab, Rami G. Melhem, Daniel Mossé, Taieb Znati
    Honeypot back-propagation for mitigating spoofing distributed Denial-of-Service attacks. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2006, v:66, n:9, pp:1152-1164 [Journal]
  6. Xuxian Jiang, Dongyan Xu, Yi-Min Wang
    Collapsar: A VM-based honeyfarm and reverse honeyfarm architecture for network attack capture and detention. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2006, v:66, n:9, pp:1165-1180 [Journal]
  7. Paul Lu, Michael Closson, Cam Macdonell, Paul Nalos, Danny Ngo, Morgan Kan, Mark Lee
    The Trellis security infrastructure for overlay metacomputers and bridged distributed file systems. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2006, v:66, n:9, pp:1181-1188 [Journal]
  8. Matthew Smith, Thomas Friese, Michael Engel, Bernd Freisleben
    Countering security threats in service-oriented on-demand grid computing using sandboxing and trusted computing techniques. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2006, v:66, n:9, pp:1189-1204 [Journal]
  9. Li Xiao, Yunhao Liu, Wenjun Gu, Dong Xuan, Xiaomei Liu
    Mutual anonymous overlay multicast. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2006, v:66, n:9, pp:1205-1216 [Journal]
  10. Mudhakar Srivatsa, Ling Liu
    Securing decentralized reputation management using TrustGuard. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2006, v:66, n:9, pp:1217-1232 [Journal]
  11. Ori Dvir, Maurice Herlihy, Nir Shavit
    Virtual Leashing: Creating a computational foundation for software protection. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2006, v:66, n:9, pp:1233-1240 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002