Search results
Lecture Notes in Computer Science > Information and Communications Security > System Security > 467-480
Lecture Notes in Computer Science > Algorithms and Computation > Algorithmic Problems in Wireless Ad Hoc Networks > 277-287
Lecture Notes in Computer Science > Recent Advances in Intrusion Detection > High Performance Intrusion Detection and Evasion > 116-134
Lecture Notes in Computer Science > Cryptology and Network Security > Applications and Implementations > 349-365
Lecture Notes in Computer Science > Information Security Applications > Intrusion Detection II > 211-222
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2007 > Workshop on Advanced Security Services (ASS 7) > 1028-1037
Lecture Notes in Computer Science > Life System Modeling and Intelligent Computing > The Second Section: Autonomy-Oriented Computing and Intelligent Agents > 233-243
Lecture Notes in Computer Science > Recent Advances in Intrusion Detection > IDS Cooperation > 54-68
Lecture Notes in Computer Science > Parallel and Distributed Processing and Applications > Session 2D: Security Algorithms and Systems I > 371-382
Lecture Notes in Computer Science > Advances in Information Security and Assurance > Cyber-attack and Cyber-terrorism > 301-306
Lecture Notes in Computer Science > Grid and Cooperative Computing > Session 5: Web Security and Web Services > 1083-1086
Lecture Notes in Computer Science > Advances in Knowledge Discovery and Data Mining > Regular Papers > 626-633
Lecture Notes in Computer Science > Artificial Neural Networks - ICANN 2008 > Pattern Recognition and Data Analysis > 32-41
Lecture Notes in Computer Science > Ad-Hoc, Mobile, and Wireless Networks > Short Papers on Security, QoS and TCP > 349-354
Lecture Notes in Computer Science > Trust, Privacy and Security in Digital Business > Prevention Systems > 45-57
Lecture Notes in Computer Science > Agent Computing and Multi-Agent Systems > Short Papers > 813-818