|
Journals in DBLP
- Christoph C. Michael, Anup K. Ghosh
Simple, state-based approaches to program-based anomaly detection. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2002, v:5, n:3, pp:203-237 [Journal]
- John Viega, J. T. Bloch, Tadayoshi Kohno, Gary McGraw
Token-based scanning of source code for security problems. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2002, v:5, n:3, pp:238-261 [Journal]
- Joe Loughry, David A. Umphress
Information leakage from optical emanations. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2002, v:5, n:3, pp:262-289 [Journal]
- Elisa Bertino, Elena Ferrari
Secure and selective dissemination of XML documents. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2002, v:5, n:3, pp:290-331 [Journal]
- Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce
A graph-based formalism for RBAC. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2002, v:5, n:3, pp:332-365 [Journal]
|