Search results
Lecture Notes in Computer Science > Recent Advances in Intrusion Detection > Network-Based Intrusion Detection > 265-283
Advances in Intelligent and Soft Computing > Monitoring, Security, and Rescue Techniques in Multiagent Systems > Application Domains and Case Studies > 455-465
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT ’99 > Broadcast and Multicast > 446-458
Lecture Notes in Computer Science > Web Information Systems and Mining > Information Security > 187-193
Lecture Notes in Computer Science > Protecting Persons While Protecting the People > Section One: Statement of the Problem > 57-62
Lecture Notes in Computer Science > Information and Communications Security > Fast Implementations > 201-215
Lecture Notes in Computer Science > Recent Advances in Intrusion Detection > Stepping Stone Detection > 1-16
Lecture Notes in Computer Science > Distributed Computing in Sensor Systems > Performance of a Propagation Delay Tolerant ALOHA Protocol for Underwater Wireless Networks > 99-111
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2007 > Workshop on Digital Content Security and Management of Distributed Computing (DCSMDC 7) > 926-936
Lecture Notes in Computer Science > Artificial Intelligence and Simulation > Mobile Computer Network > 323-332
Lecture Notes in Computer Science > Universal Multiservice Networks > Security and Privacy > 417-429
Lecture Notes in Computer Science > Critical Information Infrastructures Security > Session 8: Threats and Attacks Modeling > 287-298
Lecture Notes in Computer Science > Algorithmic Aspects in Information and Management > Contributed Papers > 354-366
Lecture Notes in Computer Science > Grid and Cooperative Computing - GCC 2004 Workshops > Workshop 3: International Workshop on Information Security and Survivability for Grid (GISS’2004) > 351-357
Lecture Notes in Computer Science > Algorithms and Architectures for Parallel Processing > ADCN 2011 Papers > 153-164
Lecture Notes in Computer Science > Computational Intelligence and Security > Intrusion Detection > 220-227
Lecture Notes in Computer Science > Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing > Data Mining, Machine Learning, and Pattern Recognition > 652-659