Analyzing network and content characteristics of spim using honeypots
SRUTI'07 Proceedings of the 3rd USENIX workshop on Steps to reducing unwanted traffic on the internet
Genetic optimization of access control schemes in virtual local area networks
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
Security in depth through smart space cascades
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
Hi-index | 0.00 |