Mohammad Chowdhury, Bon Sy, Rasheed Ahmad Application of Gaussian Estimation for Devising Reliable Vulnerability Assessment on SIP-based VoIP Infrastructure. [Citation Graph (0, 0)][DBLP] Security and Management, 2006, pp:293-299 [Conf]
Bon Sy 2006 International Workshop on the Application of Data Mining to Security Control: Foreword. [Citation Graph (0, 0)][DBLP] DMIN, 2006, pp:267-268 [Conf]