|
Journals in DBLP
- Hervé Debar, Yohann Thomas, Frédéric Cuppens, Nora Cuppens-Boulahia
Enabling automated threat response through the use of a dynamic security policy. [Citation Graph (0, 0)][DBLP] Journal in Computer Virology, 2007, v:3, n:3, pp:195-210 [Journal]
- Chandra Prakash
B-tree with fixed node size and no minimum degree. [Citation Graph (0, 0)][DBLP] Journal in Computer Virology, 2007, v:3, n:3, pp:211-219 [Journal]
- Sébastien Josse
Secure and advanced unpacking using computer emulation. [Citation Graph (0, 0)][DBLP] Journal in Computer Virology, 2007, v:3, n:3, pp:221-236 [Journal]
- Alok Sharma, Kuldip K. Paliwal
Detecting masquerades using a combination of Naïve Bayes and weighted RBF approach. [Citation Graph (0, 0)][DBLP] Journal in Computer Virology, 2007, v:3, n:3, pp:237-245 [Journal]
|