The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Bon Sy: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Mohammad Chowdhury, Bon Sy, Rasheed Ahmad
    Application of Gaussian Estimation for Devising Reliable Vulnerability Assessment on SIP-based VoIP Infrastructure. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:293-299 [Conf]
  2. Bon Sy, HingHeung Chan
    Anomaly Detection: A Signature-based Approach. [Citation Graph (0, 0)][DBLP]
    DMIN, 2005, pp:193-199 [Conf]
  3. Bon Sy
    2006 International Workshop on the Application of Data Mining to Security Control: Foreword. [Citation Graph (0, 0)][DBLP]
    DMIN, 2006, pp:267-268 [Conf]
  4. Bon Sy, Negmat Mullodzhanov
    Extracting Forensic Explanation from Intrusion Alerts. [Citation Graph (0, 0)][DBLP]
    DMIN, 2006, pp:283-289 [Conf]

  5. Secure Computation for Privacy Preserving Biometric Data Retrieval and Authentication. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.001secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002