Search results for: Siraj A. Shaikh
Vehicular Communications > 2017 > 9 > C > 8-18
Lecture Notes in Computer Science > Software Engineering and Formal Methods > Special Track: “Modelling for Sustainable Development” > 486-501
Lecture Notes in Computer Science > Information Security and Cryptology > Security Modelling > 63-74
Lecture Notes in Computer Science > Advances in Information Security and Assurance > Firewall, IDS, Anti-virus, and Other Security Products > 250-259
IFIP — The International Federation for Information Processing > Communications: Wireless in Developing Countries and Networks of the Future > WCITD 2010 > 60-71
Advances in Intelligent and Soft Computing > Computational Intelligence in Security for Information Systems > Network Security > 101-108
Computers & Electrical Engineering > 2015 > 47 > C > 327-344
Information Systems Frontiers > 2013 > 15 > 1 > 17-34
Journal of Network and Computer Applications > 2010 > 33 > 3 > 342-351
Computers & Security > 2009 > 28 > 5 > 310-324
Network Security > 2009 > 2009 > 6 > 12-16
Network Security > 2008 > 2008 > 12 > 11-15
Network Security > 2008 > 2008 > 11 > 12-16
Network Security > 2008 > 2008 > 10 > 8-11
Network Security > 2008 > 2008 > 9 > 10-12