|
Journals in DBLP
- E. Eugene Schultz
Special systems: Overlooked sources of security risk? [Citation Graph (0, 0)][DBLP] Computers & Security, 2006, v:25, n:3, pp:155- [Journal]
- Danny Bradbury
Modeling network security. [Citation Graph (0, 0)][DBLP] Computers & Security, 2006, v:25, n:3, pp:163-164 [Journal]
- Sebastiaan H. von Solms
Information Security - The Fourth Wave. [Citation Graph (0, 0)][DBLP] Computers & Security, 2006, v:25, n:3, pp:165-168 [Journal]
- Soojin Lee, Byungchun Chung, Heeyoul Kim, Yunho Lee, Chanil Park, Hyunsoo Yoon
Real-time analysis of intrusion detection alerts via correlation. [Citation Graph (0, 0)][DBLP] Computers & Security, 2006, v:25, n:3, pp:169-183 [Journal]
- Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati, Deepak B. Phatak
A novel remote user authentication scheme using bilinear pairings. [Citation Graph (0, 0)][DBLP] Computers & Security, 2006, v:25, n:3, pp:184-189 [Journal]
- Wenliang Du, Mingdong Shang, Haizhi Xu
A novel approach for computer security education using Minix instructional operating system. [Citation Graph (0, 0)][DBLP] Computers & Security, 2006, v:25, n:3, pp:190-200 [Journal]
- Jun Shao, Zhenfu Cao
A traceable threshold signature scheme with multiple signing policies. [Citation Graph (0, 0)][DBLP] Computers & Security, 2006, v:25, n:3, pp:201-206 [Journal]
- John Ayoade
Security implications in RFID and authentication processing framework. [Citation Graph (0, 0)][DBLP] Computers & Security, 2006, v:25, n:3, pp:207-212 [Journal]
- Ming Li
Change trend of averaged Hurst parameter of traffic under DDOS flood attacks. [Citation Graph (0, 0)][DBLP] Computers & Security, 2006, v:25, n:3, pp:213-220 [Journal]
- Iain Sutherland, George E. Kalb, Andrew Blyth, Gaius Mulley
An empirical examination of the reverse engineering process for binary files. [Citation Graph (0, 0)][DBLP] Computers & Security, 2006, v:25, n:3, pp:221-228 [Journal]
- Guillermo González-Talaván
A simple, configurable SMTP anti-spam filter: Greylists. [Citation Graph (0, 0)][DBLP] Computers & Security, 2006, v:25, n:3, pp:229-236 [Journal]
|