Search results
Lecture Notes in Electrical Engineering > Proceedings of the International Conference on Human-centric Computing 2011 and Embedded and Multimedia Computing 2011 > HumanCom 2011 Session 4: Privacy, Security and Trust Management > 235-244
Lecture Notes in Computer Science > Bio-Inspired Systems: Computational and Ambient Intelligence > Other Applications > 1296-1303
Lecture Notes in Computer Science > Intelligent Data Engineering and Automated Learning - IDEAL 2009 > Neuro-Informatics, Bio-Informatics and Bio-Inspired Models > 408-415
Communications in Computer and Information Science > Secure and Trust Computing, Data Management, and Applications > 116-129
Lecture Notes in Computer Science > Management Enabling the Future Internet for Changing Business and New Computing Services > Security Management > 385-394
Advances in Intelligent and Soft Computing > Soft Computing Models in Industrial and Environmental Applications, 5th International Workshop (SOCO 2010) > Agents and Multiagent Systems > 9-18
Lecture Notes in Computer Science > Information and Communications Security > System Security II > 252-264
Lecture Notes in Computer Science > Recent Advances in Intrusion Detection > Legal Aspects > 150-171
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Session 1: Malware and Intrusion Detection > 19-37
Advances in Intelligent and Soft Computing > Soft Computing Models in Industrial and Environmental Applications, 6th International Conference SOCO 2011 > System, Man, and Cybernetics > 561-570
IFIP — The International Federation for Information Processing > Information Security Management, Education and Privacy > 10th IFIP WG 11.1 Annual Working Conference on Information Security Management > 51-65
Lecture Notes in Computer Science > Detection of Intrusions and Malware, and Vulnerability Assessment > Host Security > 231-250
Communications in Computer and Information Science > Information Processing and Management > 458-460
Lecture Notes in Computer Science > Information Assurance in Computer Networks > Intrusion Detection: Foundations and Models > 143-152
Lecture Notes in Computer Science > Recent Advances in Intrusion Detection > IDS Cooperation > 85-103
Communications in Computer and Information Science > Wireless Networks, Information Processing and Systems > 433-444