Search results for: S. Felix Wu
Lecture Notes in Computer Science > Policies for Distributed Systems and Networks > Policy Specification and Analysis > 39-56
Lecture Notes in Computer Science > IP Operations and Management > Internet Security Management > 49-60
Lecture Notes in Computer Science > Detection of Intrusions and Malware, and Vulnerability Assessment > Honeypots > 32-50
IFIP — The International Federation for Information Processing > Security and Privacy in the Age of Ubiquitous Computing > Regular Papers > 343-358
Lecture Notes in Computer Science > Self-Managing Distributed Systems > Self-Protection and Access Control > 155-168
Lecture Notes in Computer Science > Social Informatics > 125-139
Lecture Notes in Computer Science > Social Informatics > 203-215
Lecture Notes in Computer Science > Wireless Algorithms, Systems, and Applications > Online Social Networks, Applications, and Systems > 527-540
Lecture Notes in Computer Science > Recent Advances in Intrusion Detection > Network-Based Intrusion Detection > 247-264
Lecture Notes in Computer Science > Detection of Intrusions and Malware, and Vulnerability Assessment > Distributed Intrusion Detection and IDS Testing > 222-240
Lecture Notes in Computer Science > Social Informatics > 232-247
Lecture Notes in Computer Science > Social Informatics > 216-231
Lecture Notes in Computer Science