Sciweavers

13 search results - page 1 / 3
» compsec 2010
Sort
View
COMPSEC
2010
81views more  COMPSEC 2010»
13 years 5 months ago
On the symbiosis of specification-based and anomaly-based detection
Natalia Stakhanova, Samik Basu, Johnny Wong
COMPSEC
2010
67views more  COMPSEC 2010»
13 years 5 months ago
Hybrid spam filtering for mobile communication
Ji Won Yoon, Hyoungshick Kim, Jun Ho Huh
COMPSEC
2010
100views more  COMPSEC 2010»
13 years 5 months ago
A note about the identifier parent property in Reed-Solomon codes
Marcel Fernandez, Josep Cotrina, Miguel Soriano, N...
COMPSEC
2010
86views more  COMPSEC 2010»
13 years 5 months ago
A knowledgeable security model for distributed health information systems
Liang Xiao 0002, Bo Hu, Madalina Croitoru, Paul H....
COMPSEC
2010
98views more  COMPSEC 2010»
13 years 5 months ago
Managing key hierarchies for access control enforcement: Heuristic approaches
Carlo Blundo, Stelvio Cimato, Sabrina De Capitani ...