Your search for 38302 returns 3449 document(s) |
Attention : attackER traceback using MAC layer abnormalilty detection, (LNCS-Lecture Notes in Computer Science 5576) Hal. 239-249 |
Author: Yongjin Kim; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Deployment value model for inrusion detection sensors, (LNCS-Lecture Notes in Computer Science 5576) Hal. 250-260 |
Author: Siraj A. Shaikh; Howard Chivers; Philip Nobles; John A. Clark; Hao Chen; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Signaling-oriented DoS attack in UMTS networks,(LNCS-Lecture Notes in Computer Science 5576) Hal. 280-289 |
Author: Georgios Kambourakis; Constantinos Kolias; Stefanos Gritzalis; and Jong Hyuk-Park; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Attack pattern discovery by frequent episodes mining from honeypot systems, (LNCS-Lecture Notes in Computer Science 5576) Hal. 301-316 |
Author: Ming Yang Su, Kai Chi Chang; Chun-Yuen Lin; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secure cover selection stegnography, (LNCS-Lecture Notes in Computer Science 5576) Hal. 317-324 |
Author: Hedieh Sajedi; Mansour Jamzad; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Combating index poisoning in P2P file sharing, (LNCS-Lecture Notes in Computer Science 5576) Hal. 358-367 |
Author: Lingli Deng; Yeping He; Ziyano Xu; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Cryptanalytic view of the NSA's skipjack block cipher design, (LNCS-Lecture Notes in Computer Science 5576) Hal. 368-381 |
Author: Jongsung Kim; Raphael C.W. Phan; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Minucode a fixed-value representation of fingerprint minutiae for biometric cryptosystem, (LNCS-Lecture Notes in Computer Science 5576) Hal. 382-391 |
Author: Jingyang Shi and Kwok Yan Lam; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Self-initialized distributed certificated authority for mobile ad hoc network, (LNCS-Lecture Notes in Computer Science 5576) Hal. 392-401 |
Author: Meng Ge; Kwok Yan Lam; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Design and delivery of undergraduate IT security management course, (LNCS-Lecture Notes in Computer Science 5576) Hal. 402-411 |
Author: Jemal H. Abawaijy; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|