|
Search the dblp DataBase
Jeffrey Horton:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Jeffrey Horton, Jennifer Seberry
Covert Distributed Computing Using Java Through Web Spoofing. [Citation Graph (0, 0)][DBLP] ACISP, 1998, pp:48-57 [Conf]
- Jeffrey Horton, Jennifer Seberry
Companion Viruses and the Macintosh: Threats and Countermeasures. [Citation Graph (0, 0)][DBLP] ACISP, 1999, pp:202-212 [Conf]
- Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo
On Securing RTP-Based Streaming Content with Firewalls. [Citation Graph (0, 0)][DBLP] CANS, 2005, pp:304-319 [Conf]
- Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo
An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme. [Citation Graph (0, 0)][DBLP] ACNS, 2007, pp:65-86 [Conf]
- Jeffrey Horton, Reihaneh Safavi-Naini
Detecting Policy Violations through Traffic Analysis. [Citation Graph (0, 0)][DBLP] ACSAC, 2006, pp:109-120 [Conf]
Transport Layer Identification of Skype Traffic. [Citation Graph (, )][DBLP]
Ranking Attack Graphs with Graph Neural Networks. [Citation Graph (, )][DBLP]
Distributed Detection of Wormhole Attacks in Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.001secs
|