Search results for: Richard A. Kemmerer
Lecture Notes in Computer Science > Fundamental Approaches to Software Engineering > Real-Time Systems > 35-50
Lecture Notes in Computer Science > Detection of Intrusions and Malware & Vulnerability Assessment > Malware and Forensics > 144-163
Lecture Notes in Computer Science > Recent Advances in Intrusion Detection > IDS Cooperation > 69-84
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO ’87 > Design and Analysis of Cryptographic Systems > 289-305
Lecture Notes in Computer Science > Computing and Combinatorics > Systems Algorithms and Modeling > 529-539
Lecture Notes in Computer Science > Mobile Agents and Security > Active Content and Security > 235-256
Lecture Notes in Computer Science > ESEC '91 > 122-146
Lecture Notes in Computer Science > STACS 2001 > Contributions > 132-143
Lecture Notes in Computer Science > Mobile Agents > Security > 31-41
Massive Computing > Managing Cyber Threats > Techniques for Managing Cyber Vulnerabilities and Alerts > 181-219
The Journal of Systems & Software > 2011 > 84 > 10 > 1618-1637
Computer Science - Research and Development > 2009 > 23 > 1 > 15-25
Journal of Computer Virology and Hacking Techniques > 2007 > 2 > 4 > 275-289