Privacy, information technology, and health care
Communications of the ACM
Proceedings of the 4th ACM conference on Computer and communications security
Support for discretionary role based access control in ACL-oriented operating systems
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security
IEEE Transactions on Software Engineering
Linux Journal
Balancing cooperation and risk in intrusion detection
ACM Transactions on Information and System Security (TISSEC)
A requires/provides model for computer attacks
Proceedings of the 2000 workshop on New security paradigms
Disarming offense to facilitate defense
Proceedings of the 2000 workshop on New security paradigms
Internet security attacks at the basic levels
ACM SIGOPS Operating Systems Review
Token-based scanning of source code for security problems
ACM Transactions on Information and System Security (TISSEC)
A proposal for a computer security course
ACM SIGCSE Bulletin
Taming the Internet for eBusiness Use
BT Technology Journal
QoS-Centric Stateful Resource Management in Information Systems
Information Systems Frontiers
Web-based testing: A study in insecurity
World Wide Web
Wrappers-a mechanism to support state-based authorisation in Web applications
Data & Knowledge Engineering - Data and applications security
A laboratory-based course on internet security
SIGCSE '03 Proceedings of the 34th SIGCSE technical symposium on Computer science education
Maintaining Component-Based Systems
IEEE Software
Intrusion Detection Based on the Immune Human System
IPDPS '02 Proceedings of the 16th International Parallel and Distributed Processing Symposium
User Interaction Design for Secure Systems
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
Introduction to Computer Security
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
Design and Implementation of a Tool for Measuring the Performance of Complex E-commerce Sites
TOOLS '00 Proceedings of the 11th International Conference on Computer Performance Evaluation: Modelling Techniques and Tools
The Role of the Development Process in Operating System Security
ISW '00 Proceedings of the Third International Workshop on Information Security
Design of the Decision Support System for Network Security Management to Secure Enterprise Network
ISC '01 Proceedings of the 4th International Conference on Information Security
Cryptographic Traces for Mobile Agents
Mobile Agents and Security
Security Issues in Mobile Code Systems
Mobile Agents and Security
A Practical Approach to Access Heterogeneous and Distributed Databases
CAiSE '99 Proceedings of the 11th International Conference on Advanced Information Systems Engineering
Misplaced Trust: Kerberos 4 Session Keys
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
RAD: A Compile-Time Solution to Buffer Overflow Attacks
ICDCS '01 Proceedings of the The 21st International Conference on Distributed Computing Systems
Analysis of security vulnerabilities in the movie production and distribution process
Proceedings of the 3rd ACM workshop on Digital rights management
Aligning Security and Usability
IEEE Security and Privacy
Towards a more effective way of teaching a cybersecurity basics course
Working group reports from ITiCSE on Innovation and technology in computer science education
User-Centric Account Management with Heterogeneous Password Changing
LISA '00 Proceedings of the 14th USENIX conference on System administration
Autonomous Agents and Multi-Agent Systems
An empirical study of the robustness of MacOS applications using random testing
Proceedings of the 1st international workshop on Random testing
Divide and conquer: the role of trust and assurance in the design of secure socio-technical systems
NSPW '05 Proceedings of the 2005 workshop on New security paradigms
Adding information assurance to the curriculum
Journal of Computing Sciences in Colleges
An empirical study of the robustness of MacOS applications using random testing
ACM SIGOPS Operating Systems Review
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
The design and analysis of graphical passwords
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
A secure station for network monitoring and control
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
An empirical study of the robustness of Windows NT applications using random testing
WSS'00 Proceedings of the 4th conference on USENIX Windows Systems Symposium - Volume 4
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Game theoretic models for detecting network intrusions
Computer Communications
A rule-based approach to security test automation on network layer
TELE-INFO'05 Proceedings of the 4th WSEAS International Conference on Telecommunications and Informatics
Honeybee-Based Model to Detect Intrusion
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Autonomous agents-based security infrastructure
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartII
Optimal algorithms for detecting network stability
WALCOM'08 Proceedings of the 2nd international conference on Algorithms and computation
Customizable FPGA IP core implementation of a general-purpose genetic algorithm engine
IEEE Transactions on Evolutionary Computation
Software security aspects of Java-based mobile phones
Proceedings of the 2011 ACM Symposium on Applied Computing
Improving host-based IDS with argument abstraction to prevent mimicry attacks
RAID'05 Proceedings of the 8th international conference on Recent Advances in Intrusion Detection
Asymptotic synchronization of the Colpitts oscillator
Computers & Mathematics with Applications
RIDA: robust intrusion detection in ad hoc networks
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
Review: TCP/IP security threats and attack methods
Computer Communications
Hi-index | 0.02 |