|
Journals in DBLP
From the Editor-in-Chief. [Citation Graph (, )][DBLP]
Information security requirements - Interpreting the legal aspects. [Citation Graph (, )][DBLP]
A SIP-oriented SPIT Management Framework. [Citation Graph (, )][DBLP]
SMSSec: An end-to-end protocol for secure SMS. [Citation Graph (, )][DBLP]
Critical study of neural networks in detecting intrusions. [Citation Graph (, )][DBLP]
Application-based anomaly intrusion detection with dynamic information flow analysis. [Citation Graph (, )][DBLP]
Building network attack graph for alert causal correlation. [Citation Graph (, )][DBLP]
Enforcing memory policy specifications in reconfigurable hardware. [Citation Graph (, )][DBLP]
Practical anonymous user authentication scheme with security proof. [Citation Graph (, )][DBLP]
Information security management: An information security retrieval and awareness model for industry. [Citation Graph (, )][DBLP]
|