Search results for: Howard Chivers
Software: Practice and Experience > 47 > 5 > 669 - 688
IFIP — The International Federation for Information Processing > Communications and Multimedia Security > Privacy/Anonymity > 17-29
Lecture Notes in Computer Science > Extreme Programming and Agile Processes in Software Engineering > New Practices for Agile Software Development > 154-163
Lecture Notes in Computer Science > Communications and Multimedia Security > Applied Cryptography > 233-244
Lecture Notes in Computer Science > Model Driven Architecture – Foundations and Applications > Model Transformation > 205-219
Lecture Notes in Computer Science > Advances in Information Security and Assurance > Firewall, IDS, Anti-virus, and Other Security Products > 250-259
Lecture Notes in Computer Science > Extreme Programming and Agile Processes in Software Engineering > New Insights > 57-65
Advances in Intelligent and Soft Computing > Computational Intelligence in Security for Information Systems > Network Security > 101-108
Digital Investigation > 2014 > 11 > 1 > 20-29
Information Systems Frontiers > 2013 > 15 > 1 > 17-34
Digital Investigation > 2011 > 7 > 3-4 > 114-126
Computers & Security > 2009 > 28 > 7 > 521-535
Network Security > 2009 > 2009 > 6 > 12-16
Information and Software Technology > 2009 > 51 > 5 > 876-893
Network Security > 2008 > 2008 > 12 > 11-15
Network Security > 2008 > 2008 > 11 > 12-16