Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
7
search results - page 1 / 2
»
mmmacns 2010
Sort
relevance
views
votes
recent
update
View
thumb
title
11
click to vote
MMMACNS
2010
Springer
122
views
Information Technology
»
more
MMMACNS 2010
»
Using Equivalence Relations for Corrective Enforcement of Security Policies
13 years 2 months ago
Download
comsec.spb.ru
Raphael Khoury, Nadia Tawbi
claim paper
Read More »
10
click to vote
MMMACNS
2010
Springer
159
views
Information Technology
»
more
MMMACNS 2010
»
Predictive Security Analysis for Event-Driven Processes
13 years 2 months ago
Download
comsec.spb.ru
Roland Rieke, Zaharina Stoynova
claim paper
Read More »
19
click to vote
MMMACNS
2010
Springer
229
views
Information Technology
»
more
MMMACNS 2010
»
A Comparison of Feature-Selection Methods for Intrusion Detection
13 years 2 months ago
Download
comsec.spb.ru
Hai Thanh Nguyen, Slobodan Petrovic, Katrin Franke
claim paper
Read More »
13
click to vote
MMMACNS
2010
Springer
121
views
Information Technology
»
more
MMMACNS 2010
»
Policy-Based Design and Verification for Mission Assurance
13 years 3 months ago
Download
comsec.spb.ru
Shiu-Kai Chin, Sarah Muccio, Susan Older, Thomas N...
claim paper
Read More »
13
click to vote
MMMACNS
2010
Springer
139
views
Information Technology
»
more
MMMACNS 2010
»
Credentials Management for High-Value Transactions
13 years 3 months ago
Download
www.ecs.syr.edu
Abstract. Partner key management (PKM) is an interoperable credential management protocol for online commercial transactions of high value. PKM reinterprets traditional public key ...
Glenn S. Benson, Shiu-Kai Chin, Sean Croston, Kart...
claim paper
Read More »
« Prev
« First
page 1 / 2
Last »
Next »