|
Journals in DBLP
Mobile computing: The next Pandora's Box. [Citation Graph (, )][DBLP]
SVision: A novel visual network-anomaly identification technique. [Citation Graph (, )][DBLP]
Modeling and analyzing the spread of active worms based on P2P systems. [Citation Graph (, )][DBLP]
Measuring, analyzing and predicting security vulnerabilities in software systems. [Citation Graph (, )][DBLP]
Evaluating information security tradeoffs: Restricting access can interfere with user tasks. [Citation Graph (, )][DBLP]
M-CLIQUES: Modified CLIQUES key agreement for secure multicast. [Citation Graph (, )][DBLP]
Adaptable security mechanism for dynamic environments. [Citation Graph (, )][DBLP]
Holistic security management framework applied in electronic commerce. [Citation Graph (, )][DBLP]
|