A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior
IEEE Transactions on Software Engineering
A Model of Attacks of Malicious Hosts Against Mobile Agents
ECOOP '98 Workshop ion on Object-Oriented Technology
On the Security Properties and Attacks against Mobile Agent Graph Head Sealing (MAGHS)
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Mobile agent watermarking (MAW): security properties and attacks revisited
Proceedings of the 7th International Conference on Frontiers of Information Technology
Hi-index | 0.01 |