Application of security tot he computing science classroom
Proceedings of the thirty-first SIGCSE technical symposium on Computer science education
Secure and selective dissemination of XML documents
ACM Transactions on Information and System Security (TISSEC)
Survivable Network System Analysis: A Case Study
IEEE Software
A Content-Based Authorization Model for Digital Libraries
IEEE Transactions on Knowledge and Data Engineering
Access Control: Policies, Models, and Mechanisms
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Modelling the Crypto-Processor from Design to Synthesis
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
Privacy through pseudonymity in user-adaptive systems
ACM Transactions on Internet Technology (TOIT)
Security issues in ad hoc networks
The handbook of ad hoc wireless networks
Building an information security education program
Proceedings of the 1st annual conference on Information security curriculum development
A novel scenario-based information security management exercise
Proceedings of the 1st annual conference on Information security curriculum development
D-SCIDS: distributed soft computing intrusion detection system
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Modeling intrusion detection system using hybrid intelligent systems
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
An adaptive expert system approach for intrusion detection
International Journal of Security and Networks
Information Systems Security
Patterns for session-based access control
Proceedings of the 2006 conference on Pattern languages of programs
Even more patterns for secure operating systems
Proceedings of the 2006 conference on Pattern languages of programs
Patterns and Pattern Diagrams for Access Control
TrustBus '08 Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business
A framework for synthetic stego
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
Evolutionary flexible neural networks for intrusion detection system
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
MEPIDS: multi-expression programming for intrusion detection system
IWINAC'05 Proceedings of the First international work-conference on the Interplay Between Natural and Artificial Computation conference on Artificial Intelligence and Knowledge Engineering Applications: a bioinspired approach - Volume Part II
ICAISC'06 Proceedings of the 8th international conference on Artificial Intelligence and Soft Computing
Ideal based cyber security technical metrics for control systems
CRITIS'07 Proceedings of the Second international conference on Critical Information Infrastructures Security
SP 800-36. Guide to Selecting Information Technology Security Products
SP 800-36. Guide to Selecting Information Technology Security Products
Modeling and validating the clinical information systems policy using alloy
HIS'13 Proceedings of the second international conference on Health Information Science
Hi-index | 0.00 |