|
Journals in DBLP
An assessment of website password practices. [Citation Graph (, )][DBLP]
Key agreement for key hypergraph. [Citation Graph (, )][DBLP]
An active learning based TCM-KNN algorithm for supervised network intrusion detection. [Citation Graph (, )][DBLP]
A non-intrusive biometric authentication mechanism utilising physiological characteristics of the human head. [Citation Graph (, )][DBLP]
Mining TCP/IP packets to detect stepping-stone intrusion. [Citation Graph (, )][DBLP]
The security challenges inherent in VoIP. [Citation Graph (, )][DBLP]
Intrusion detection using text processing techniques with a kernel based similarity measure. [Citation Graph (, )][DBLP]
Run-time label propagation for forensic audit data. [Citation Graph (, )][DBLP]
|