A distributed multipurpose mail guard
Wolthusen, S.D.
Published in IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003 (2003)
Published in IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003 (2003)
Get full text
Conference Proceeding
A link-layer-based self-replicating vulnerability discovery agent
Al-Salloum, Z S, Wolthusen, S D
Published in The IEEE symposium on Computers and Communications (01.06.2010)
Published in The IEEE symposium on Computers and Communications (01.06.2010)
Get full text
Conference Proceeding
Towards Concurrent Data Sampling Using GPU Coprocessing
Seeger, M. M., Wolthusen, S. D.
Published in 2012 Seventh International Conference on Availability, Reliability and Security (01.08.2012)
Published in 2012 Seventh International Conference on Availability, Reliability and Security (01.08.2012)
Get full text
Conference Proceeding
A model for partially asynchronous observation of malicious behavior
Seeger, M. M., Wolthusen, S. D.
Published in 2012 Information Security for South Africa (01.08.2012)
Published in 2012 Information Security for South Africa (01.08.2012)
Get full text
Conference Proceeding
A propagation model of a vulnerability mitigation computer worm - seawave
Al-Salloum, Z. S., Wolthusen, S. D.
Published in 2011 5th International Conference on Network and System Security (01.09.2011)
Published in 2011 5th International Conference on Network and System Security (01.09.2011)
Get full text
Conference Proceeding
Teeth Segmentation and Feature Extraction for Odontological Biometrics
Mairaj, D, Wolthusen, S D, Busch, C
Published in 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (01.10.2010)
Published in 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (01.10.2010)
Get full text
Conference Proceeding
Resource-constrained signal propagation modeling for tactical mobile ad hoc networks
Reidt, S., Ebinger, P., Kuijper, A., Wolthusen, S. D.
Published in 2011 IEEE Network Science Workshop (01.06.2011)
Published in 2011 IEEE Network Science Workshop (01.06.2011)
Get full text
Conference Proceeding
Goalkeeper: close-in interface protection
Wolthusen, S.D.
Published in 19th Annual Computer Security Applications Conference, 2003. Proceedings (2003)
Published in 19th Annual Computer Security Applications Conference, 2003. Proceedings (2003)
Get full text
Conference Proceeding
Molehunt: near-line semantic activity tracing
Wolthusen, S.D.
Published in Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop (2005)
Published in Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop (2005)
Get full text
Conference Proceeding
Modeling critical infrastructure requirements
Wolthusen, S.D.
Published in Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004 (2004)
Published in Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004 (2004)
Get full text
Conference Proceeding
Enforcing messaging security policies
Likavec, J., Wolthusen, S.D.
Published in Third IEEE International Workshop on Information Assurance (IWIA'05) (2005)
Published in Third IEEE International Workshop on Information Assurance (IWIA'05) (2005)
Get full text
Conference Proceeding
Tracing data diffusion in industrial research with robust watermarking
Busch, C., Wolthusen, S.D.
Published in 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564) (2001)
Published in 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564) (2001)
Get full text
Conference Proceeding