Cost Evaluation for Intrusion Response Using Dependency Graphs
Kheir, N., Debar, H., Cuppens-Boulahia, N., Cuppens, F., Viinikka, J.
Published in 2009 International Conference on Network and Service Security (01.06.2009)
Get full text
Published in 2009 International Conference on Network and Service Security (01.06.2009)
Conference Proceeding
Exploiting diversity and correlation to improve the performance of intrusion detection systems
Coppolino, L., D'Antonio, S., Esposito, M., Romano, L.
Published in 2009 International Conference on Network and Service Security (01.06.2009)
Get full text
Published in 2009 International Conference on Network and Service Security (01.06.2009)
Conference Proceeding
A Pairing Identity based Key Management Protocol for Heterogeneous Wireless Sensor Networks
Boujelben, M., Cheikhrouhou, O., Abid, M., Youssef, H.
Published in 2009 International Conference on Network and Service Security (01.06.2009)
Get full text
Published in 2009 International Conference on Network and Service Security (01.06.2009)
Conference Proceeding
A PVSS Scheme Based on Boolean Operations with Improved Contrast
Ulutas, M., Nabiyev, V.V., Ulutas, G.
Published in 2009 International Conference on Network and Service Security (01.06.2009)
Get full text
Published in 2009 International Conference on Network and Service Security (01.06.2009)
Conference Proceeding
An Efficient Multi-Parameter Group Leader Selection Scheme for Wireless Sensor Networks
Kifayat, K., Merabti, M., Qi Shi, Llewellyn-Jones, D.
Published in 2009 International Conference on Network and Service Security (01.06.2009)
Get full text
Published in 2009 International Conference on Network and Service Security (01.06.2009)
Conference Proceeding
Formal Verification of IEEE 802.16 Security Sublayer Using Scyther Tool
Taha, Ahmed M., Abdel-Hamid, Amr T., Tahar, Sofiene
Published in 2009 International Conference on Network and Service Security (01.06.2009)
Get full text
Published in 2009 International Conference on Network and Service Security (01.06.2009)
Conference Proceeding
Design of a Simulation Framework to Evaluate Trust Models for Collaborative Intrusion Detection
Fung, C., Zhang, J., Aib, I., Boutaba, R., Cohen, R.
Published in 2009 International Conference on Network and Service Security (01.06.2009)
Get full text
Published in 2009 International Conference on Network and Service Security (01.06.2009)
Conference Proceeding
Regarding timeliness in the context of fair exchange
Piva, F.R., Monteiro, J.R.M., Dahab, R.
Published in 2009 International Conference on Network and Service Security (01.06.2009)
Get full text
Published in 2009 International Conference on Network and Service Security (01.06.2009)
Conference Proceeding
Hierarchical Cluster Based Routing for Highly Mobile Heterogeneous MANET
Yang Xia, Chai Kiat Yeo, Bu Sung Lee
Published in 2009 International Conference on Network and Service Security (01.06.2009)
Get full text
Published in 2009 International Conference on Network and Service Security (01.06.2009)
Conference Proceeding
Optimal Algorithms for Generation of User Session Sequences Using Server Side Web User Logs
Arumugam, G., Suguna, S.
Published in 2009 International Conference on Network and Service Security (01.06.2009)
Get full text
Published in 2009 International Conference on Network and Service Security (01.06.2009)
Conference Proceeding
Fuzzy mega cluster based anomaly network intrusion detection
Hubballi, N., Biswas, S., Nandi, S.
Published in 2009 International Conference on Network and Service Security (01.06.2009)
Get full text
Published in 2009 International Conference on Network and Service Security (01.06.2009)
Conference Proceeding
A Novel Approach to Watermark Text Documents Based on Eigen Values
TamilSelvan, Rethika, Prathap, Ivy, Ramalingam, Anitha, Raghavan, Serugudi
Published in 2009 International Conference on Network and Service Security (01.06.2009)
Get full text
Published in 2009 International Conference on Network and Service Security (01.06.2009)
Conference Proceeding
Single Sign-On Integration in a Distributed Enterprise Service Bus
Sliman, L., Badr, Y., Biennier, F., Salatge, N., Nakao, Z.
Published in 2009 International Conference on Network and Service Security (01.06.2009)
Get full text
Published in 2009 International Conference on Network and Service Security (01.06.2009)
Conference Proceeding
A Trusted Platform Module Based Anti-Forensics System
Weihan Goh, Peng Chor Leong, Chai Kiat Yeo
Published in 2009 International Conference on Network and Service Security (01.06.2009)
Get full text
Published in 2009 International Conference on Network and Service Security (01.06.2009)
Conference Proceeding
Flexible Authentication Framework
Hajny, J., Pelka, T., Lambertova, P.
Published in 2009 International Conference on Network and Service Security (01.06.2009)
Get full text
Published in 2009 International Conference on Network and Service Security (01.06.2009)
Conference Proceeding
A Prior Distribution for Anti-spam Statistical Bayesian Model
Begriche, Y., Labiod, H.
Published in 2009 International Conference on Network and Service Security (01.06.2009)
Get full text
Published in 2009 International Conference on Network and Service Security (01.06.2009)
Conference Proceeding
Reconnaissance Scan Detection Heuristics to disrupt the pre-attack information gathering
Udhayan, J., Muruga Prabu, M., Aravinda Krishnan, V., Anitha, R.
Published in 2009 International Conference on Network and Service Security (01.06.2009)
Get full text
Published in 2009 International Conference on Network and Service Security (01.06.2009)
Conference Proceeding
Performance Study of a Cross-layer Optimization to the DSR Routing Protocol in Wireless Mesh Networks
Ramadhan, M., Davis, M.
Published in 2009 International Conference on Network and Service Security (01.06.2009)
Get full text
Published in 2009 International Conference on Network and Service Security (01.06.2009)
Conference Proceeding