A graph-based system for network-vulnerability analysis
Proceedings of the 1998 workshop on New security paradigms
Automated Generation and Analysis of Attack Graphs
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
HIDS: Honesty-Rate Based Collaborative Intrusion Detection System for Mobile Ad-Hoc Networks
CISIM '08 Proceedings of the 2008 7th Computer Information Systems and Industrial Management Applications
Trust Model to Enhance Security and Interoperability of Cloud Environment
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
A Simple Technique for Securing Data at Rest Stored in a Computing Cloud
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
Security audits of multi-tier virtual infrastructures in public infrastructure clouds
Proceedings of the 2010 ACM workshop on Cloud computing security workshop
SERVICES '11 Proceedings of the 2011 IEEE World Congress on Services
Hi-index | 0.00 |