Abstract
No abstract available.
Cited By
- Al-Bastaki Y, Herath A, Al-Mutawah K, Baqer M, Herath S and Goonatilake R e-learning of security and information assurance with sequence diagrams Proceedings of the 2012 Joint International Conference on Human-Centered Computer Environments, (19-22)
- Benali F, Bennani N, Gianini G and Cimato S A distributed and privacy-preserving method for network intrusion detection Proceedings of the 2010 international conference on On the move to meaningful internet systems: Part II, (861-875)
- Buford J, Yu H and Lua E (2008). P2P Networking and Applications, 10.5555/1523319, Online publication date: 12-Dec-2008.
- Koukopoulos D, Nikolopoulos S, Palios L and Spirakis P Optimal algorithms for detecting network stability Proceedings of the 2nd international conference on Algorithms and computation, (188-199)
- Maddi S and Srinivas M A unified and reconfigurable Montgomery Multiplier architecture without four-to-two CSA Proceedings of the 20th annual conference on Integrated circuits and systems design, (147-152)
- Kim Y, Choi S, Lee G and Lee G Entity Based Message Authentication System Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications, (948-955)
- Ciaramella A, D'Arco P, De Santis A, Galdi C and Tagliaferri R (2006). Neural Network Techniques for Proactive Password Checking, IEEE Transactions on Dependable and Secure Computing, 3:4, (327-339), Online publication date: 1-Oct-2006.
- Hämäläinen P, Kuorilehto M, Alho T, Hännikäinen M and Hämäläinen T Security in wireless sensor networks Proceedings of the 6th international conference on Embedded Computer Systems: architectures, Modeling, and Simulation, (167-177)
- Noh S, Kim J and Lee D Assurance method of high availability in information security infrastructure system Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks, (1110-1116)
- Elbirt A and Paar C (2005). An Instruction-Level Distributed Processor for Symmetric-Key Cryptography, IEEE Transactions on Parallel and Distributed Systems, 16:5, (468-480), Online publication date: 1-May-2005.
- Reifer D, Baxi P, Hirata F, Schifman J and Tsao R Addressing malicious code in COTS Proceedings of the 4th international conference on COTS-Based Software Systems, (157-167)
- van der Merwe A, Loock M and Dabrowski M Characteristics and responsibilities involved in a Phishing attack Proceedings of the 4th international symposium on Information and communication technologies, (249-254)
- C J and S V Distributed group access control architecture for secure multicast Proceedings of the Third international conference on Advances in Information Systems, (585-594)
- Shaikh S Information security education in the UK Proceedings of the 1st annual conference on Information security curriculum development, (53-58)
- Tak S and Park E (2019). A Software Framework for Non-Repudiation Service based on Adaptive~Secure Methodology in Electronic Commerce, Information Systems Frontiers, 6:1, (47-66), Online publication date: 1-Mar-2004.
- Álvarez G and Petrović S (2019). Refereed paper, Computers and Security, 22:5, (435-449), Online publication date: 1-Jul-2003.
- Karras D and Zorkadis V (2019). On neural network techniques in the secure management of communication systems through improving and quality assessing pseudorandom stream generators, Neural Networks, 16:5-6, (899-905), Online publication date: 1-Jun-2003.
- Bhalla N (2003). Refereed Is the mouse click mighty enough to bring society to its knees?, Computers and Security, 22:4, (322-336), Online publication date: 1-May-2003.
- Brooks R and Orr N (2002). A Model for Mobile Code Using Interacting Automata, IEEE Transactions on Mobile Computing, 1:4, (313-326), Online publication date: 1-Oct-2002.
- Boukerche A and Notare M (2002). Behavior-based intrusion detection in mobile phone systems, Journal of Parallel and Distributed Computing, 62:9, (1476-1490), Online publication date: 1-Sep-2002.
- Ye N, Emran S, Chen Q and Vilbert S (2002). Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection, IEEE Transactions on Computers, 51:7, (810-820), Online publication date: 1-Jul-2002.
- Ye N (2019). QoS-Centric Stateful Resource Management in Information Systems, Information Systems Frontiers, 4:2, (149-160), Online publication date: 1-Jul-2002.
- Buchegger S and Le Boudec J Nodes bearing grudges Proceedings of the 10th Euromicro conference on Parallel, distributed and network-based processing, (403-410)
- Patiyoot D (2002). Security issues for wireless ATM networks, ACM SIGOPS Operating Systems Review, 36:1, (31-57), Online publication date: 1-Jan-2002.
- Chang K, Lee B and Kim T (2019). Open Authentication Model Supporting Electronic Commerce in Distributed Computing, Electronic Commerce Research, 2:1-2, (135-149), Online publication date: 1-Jan-2002.
- Yi S, Naldurg P and Kravets R Security-aware ad hoc routing for wireless networks Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing, (299-302)
- Alsinet T, Béjar R, Fernanadez C and Manyà F A Multi-agent system architecture for monitoring medical protocols Proceedings of the fourth international conference on Autonomous agents, (499-505)
- Prevelakis V A secure station for network monitoring and control Proceedings of the 8th conference on USENIX Security Symposium - Volume 8, (10-10)
- de Vivo M, de Vivo G and Isern G (1998). Internet security attacks at the basic levels, ACM SIGOPS Operating Systems Review, 32:2, (4-15), Online publication date: 1-Apr-1998.
- Valia R and Al-Salqan Y Secure Workflow Environment Proceedings of the 6th Workshop on Enabling Technologies on Infrastructure for Collaborative Enterprises, (269-276)
Index Terms
- Network and internetwork security: principles and practice
Please enable JavaScript to view thecomments powered by Disqus.