ACM SIGAPP Applied Computing Review - Special issue on security
IBM Systems Journal
ACM Computing Surveys (CSUR)
Security on the move: indirect authentication using Kerberos
MobiCom '96 Proceedings of the 2nd annual international conference on Mobile computing and networking
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Inside risks: a risks-related bookshelf
Communications of the ACM
Internet security: firewalls and beyond
Communications of the ACM
Multicast security and its extension to a mobile environment
Wireless Networks
Fast and scalable layer four switching
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
A security architecture for the Internet protocol
IBM Systems Journal
Design of a high-performance ATM firewall
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
ID-based secret-key cryptography
ACM SIGOPS Operating Systems Review
A new model of security for distributed systems
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Design and implementation of a distributed virtual machine for networked computers
Proceedings of the seventeenth ACM symposium on Operating systems principles
Distributed virtual machines: a system architecture for network computing
Proceedings of the 8th ACM SIGOPS European workshop on Support for composing distributed applications
Design of a high-performance ATM firewall
ACM Transactions on Information and System Security (TISSEC)
International Journal of Network Management
Operating system enhancements to prevent the misuse of system calls
Proceedings of the 7th ACM conference on Computer and communications security
Implementing a distributed firewall
Proceedings of the 7th ACM conference on Computer and communications security
Secure Execution of Java Applets Using a Remote Playground
IEEE Transactions on Software Engineering
Associating network flows with user and application information
MULTIMEDIA '00 Proceedings of the 2000 ACM workshops on Multimedia
A proxy-based personal web archiving service
ACM SIGOPS Operating Systems Review
Protecting web servers from distributed denial of service attacks
Proceedings of the 10th international conference on World Wide Web
Cost profile of a highly assured, secure operating system
ACM Transactions on Information and System Security (TISSEC)
Remus: a security-enhanced operating system
ACM Transactions on Information and System Security (TISSEC)
Dependability of COTS Microkernel-Based Systems
IEEE Transactions on Computers - Special issue on fault-tolerant embedded systems
Handbook of wireless networks and mobile computing
Computer Networks: The International Journal of Computer and Telecommunications Networking
Computer Networks: The International Journal of Computer and Telecommunications Networking
Mobile Networking Through Mobile IP
IEEE Internet Computing
Survivability: Protecting Your Critical Systems
IEEE Internet Computing
Linux and the Developing World
IEEE Software
Building Survivable Services Using Redundancy and Adaptation
IEEE Transactions on Computers
Defending against an Internet-based attack on the physical world
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
Wrapping Real-Time Systems from Temporal Logic Specifications
EDCC-4 Proceedings of the 4th European Dependable Computing Conference on Dependable Computing
Interval Weighted Load Balancing Method for Multiple Application Gateway Firewalls
ICCS '02 Proceedings of the International Conference on Computational Science-Part III
Application-Integrated Data Collection for Security Monitoring
RAID '00 Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection
SWAT '00 Proceedings of the 7th Scandinavian Workshop on Algorithm Theory
A Unified Methodology for Verification and Synthesis of Firewall Configurations
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
The Consistency of an Access Control List
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Security Protocols and Specifications
FoSSaCS '99 Proceedings of the Second International Conference on Foundations of Software Science and Computation Structure, Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS'99
Specification-Based Testing of Firewalls
PSI '02 Revised Papers from the 4th International Andrei Ershov Memorial Conference on Perspectives of System Informatics: Akademgorodok, Novosibirsk, Russia
Providing Secure Environments for Untrusted Network Applications
WET-ICE '97 Proceedings of the 6th Workshop on Enabling Technologies on Infrastructure for Collaborative Enterprises
On the Security and Vulnerability of PING
WSS '01 Proceedings of the 5th International Workshop on Self-Stabilizing Systems
Introduction to Computer Security
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
Granidt: Towards Gigabit Rate Network Intrusion Detection Technology
FPL '02 Proceedings of the Reconfigurable Computing Is Going Mainstream, 12th International Conference on Field-Programmable Logic and Applications
Encrypted Message Authentication by Firewalls
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Security of Electronic Business Applications - Structure and Quantification
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
Internet security and intrusion detection
Proceedings of the 25th International Conference on Software Engineering
HCW '97 Proceedings of the 6th Heterogeneous Computing Workshop (HCW '97)
Blocking Java Applets at the Firewall
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Probable Plaintext Cryptanalysis of the IP Security Protocols
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
WET-ICE '96 Proceedings of the 5th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'96)
ISCC '00 Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
Efficient protocols secure against guessing and replay attacks
ICCCN '95 Proceedings of the 4th International Conference on Computer Communications and Networks
Design and Implementation of Virtual Private Services
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Cascade of Distributed and Cooperating Firewalls in a Secure Data Network
IEEE Transactions on Knowledge and Data Engineering
Addressing reality: an architectural response to real-world demands on the evolving Internet
FDNA '03 Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture
Lessons and Challenges from Mining Retail E-Commerce Data
Machine Learning
Bamba: audio and video streaming over the internet
IBM Journal of Research and Development - Papers on mustimedia systems
Defending against an Internet-based attack on the physical world
ACM Transactions on Internet Technology (TOIT)
A method for designing secure solutions
IBM Systems Journal - End-to-end security
Centralized Administration of Distributed Firewalls
LISA '96 Proceedings of the 10th USENIX conference on System administration
IP Multiplexing by Transparent Port-Address Translator
LISA '96 Proceedings of the 10th USENIX conference on System administration
Internet Routing and DNS Voodoo in the Enterprise
LISA '99 Proceedings of the 13th USENIX conference on System administration
URSA: ubiquitous and robust access control for mobile ad hoc networks
IEEE/ACM Transactions on Networking (TON)
Proceedings of the 1st annual conference on Information security curriculum development
PRISM: A Preventive and Risk-Reducing Integrated Security Management Model Using Security Label
The Journal of Supercomputing
Encyclopedia of Computer Science
Storage-based file system integrity checker
Proceedings of the 2005 ACM workshop on Storage security and survivability
Flow labelled IP over ATM: design and rationale
ACM SIGCOMM Computer Communication Review
Research on Object-Storage-Based Intrusion Detection
ICPADS '06 Proceedings of the 12th International Conference on Parallel and Distributed Systems - Volume 1
A stochastic estimator/detector for mitigating denial of service attacks
Proceedings of the 43rd annual Southeast regional conference - Volume 2
Three tiered web-based manufacturing system-Part 1: System development
Robotics and Computer-Integrated Manufacturing
Performing real-time threat assessment of security incidents using data fusion of IDS logs
Journal of Computer Security
iKP: a family of secure electronic payment protocols
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
Secure public internet access handler (SPINACH)
USITS'97 Proceedings of the USENIX Symposium on Internet Technologies and Systems on USENIX Symposium on Internet Technologies and Systems
Securing 'classical IP over ATM networks'
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
A secure environment for untrusted helper applications confining the Wily Hacker
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
A DNS filter and switch for packet-filtering gateways
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Confining root programs with domain and type enforcement (DTE)
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Enclaves: enabling secure collaboration over the internet
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Design and implementation of modular key management protocol and IP secure tunnel on AIX
SSYM'95 Proceedings of the 5th conference on USENIX UNIX Security Symposium - Volume 5
Implementing a secure rlogin environment: a case study of using a secure network layer protocol
SSYM'95 Proceedings of the 5th conference on USENIX UNIX Security Symposium - Volume 5
Improving the trustworthiness of evidence derived from security trace files
SSYM'95 Proceedings of the 5th conference on USENIX UNIX Security Symposium - Volume 5
Tricks you can do if your firewall is a bridge
NETA'99 Proceedings of the 1st conference on Conference on Network Administration - Volume 1
Path-Based Access Control for Enterprise Networks
ISC '08 Proceedings of the 11th international conference on Information Security
Asynchronous policy evaluation and enforcement
Proceedings of the 2nd ACM workshop on Computer security architectures
Security Policies Tuning Among IP Devices
KES '07 Knowledge-Based Intelligent Information and Engineering Systems and the XVII Italian Workshop on Neural Networks on Proceedings of the 11th International Conference
A secure mobile agents approach for anomalies detection on firewalls
Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services
The 'how' and 'why' of persistent information security
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
ROFL: routing as the firewall layer
Proceedings of the 2008 workshop on New security paradigms
ODISET: On-line distributed session tracing using agents
IJCAI'03 Proceedings of the 18th international joint conference on Artificial intelligence
Ranking secure technologies in security provision financial transactions mobile commerce
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
A review of classification methods for network vulnerability
SMC'09 Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics
Information security underlying transparent computing: Impacts, visions and challenges
Web Intelligence and Agent Systems
Pushing boulders uphill: the difficulty of network intrusion recovery
LISA'09 Proceedings of the 23rd conference on Large installation system administration
Storage-Based Intrusion Detection
ACM Transactions on Information and System Security (TISSEC)
Algorithms and theory of computation handbook
CANVuS: context-aware network vulnerability scanning
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
An insider threat prediction model
TrustBus'10 Proceedings of the 7th international conference on Trust, privacy and security in digital business
INFOCOM'96 Proceedings of the Fifteenth annual joint conference of the IEEE computer and communications societies conference on The conference on computer communications - Volume 2
Proceedings of the 26th Annual Computer Security Applications Conference
A distributed and privacy-preserving method for network intrusion detection
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems: Part II
Managing the risks of smarter planet solutions
IBM Journal of Research and Development
Java security: from hotjava to netscape and beyond
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
The design of secure node system based on integrated security engine (SNSISE)
CIMMACS'05 Proceedings of the 4th WSEAS international conference on Computational intelligence, man-machine systems and cybernetics
A study on hierarchical policy model for managing heterogeneous security systems
ICCSA'11 Proceedings of the 2011 international conference on Computational science and its applications - Volume Part IV
The price of defense and fractional matchings
ICDCN'06 Proceedings of the 8th international conference on Distributed Computing and Networking
On securing RTP-Based streaming content with firewalls
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V
MFCS'06 Proceedings of the 31st international conference on Mathematical Foundations of Computer Science
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
RIDA: robust intrusion detection in ad hoc networks
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
Transmission-Efficient image-based authentication for mobile devices
VLBV'05 Proceedings of the 9th international conference on Visual Content Processing and Representation
SP 800-12. An Introduction to Computer Security: the NIST Handbook
SP 800-12. An Introduction to Computer Security: the NIST Handbook
Research: Firewalls in an OSI-environment
Computer Communications
Tutorial: Internet/Intranet firewall security-policy, architecture and transaction services
Computer Communications
Review: TCP/IP security threats and attack methods
Computer Communications
Feature: The Freedom of Information Act and the 2600 Club
Network Security
Feature: Building the right firewall
Network Security
How secure is data over the internet?
Network Security
The Enhancement of Security in Healthcare Information Systems
Journal of Medical Systems
Visual analysis of complex firewall configurations
Proceedings of the Ninth International Symposium on Visualization for Cyber Security
Speculations on the science of web user security
Computer Networks: The International Journal of Computer and Telecommunications Networking
Information Systems and e-Business Management
Process firewalls: protecting processes during resource access
Proceedings of the 8th ACM European Conference on Computer Systems
A building code for building code: putting what we know works to work
Proceedings of the 29th Annual Computer Security Applications Conference
Hi-index | 0.03 |