Search results
Communications in Computer and Information Science > Secure and Trust Computing, Data Management, and Applications > 116-129
Lecture Notes in Computer Science > Recent Advances in Intrusion Detection > IDS Cooperation > 69-84
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2004 > Approaches or Methods of Security Engineering Workshop > 547-556
Studies in Computational Intelligence > Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing > 39-48
Lecture Notes in Computer Science > Computer Network Security > Intrusion and Malware Detection > 217-228
IFIP — The International Federation for Information Processing > Security and Privacy in the Age of Ubiquitous Computing > Regular Papers > 375-391
Lecture Notes in Computer Science > Dependable Computing > Intrusion Tolerance and Security > 198-211
Lecture Notes in Computer Science > Dependable and Historic Computing > Part C: Contributed Papers > 238-250
Lecture Notes in Computer Science > Trust, Privacy and Security in Digital Business > Session 8: Security and Trust > 259-268
Lecture Notes in Computer Science > Formal Techniques for Networked and Distributed Systems – FORTE 2004 > Regular Papers > 359-376
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2007 > Workshop on Information Systems and Information Technologies (ISIT 7) > 383-396
Lecture Notes in Computer Science > On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops > 585-594
Communications in Computer and Information Science > Advances in Computing and Communications > Security, Trust and Privacy > 35-43
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering > Mobile Wireless Middleware, Operating Systems, and Applications > Session 5: Location-Aware and Context-Aware Networking and Computing (Chair: Chris Thompson) > 235-249
Introduction to E-commerce > Technology > 135-168