Sciweavers

COMPSEC
2010
81views more  COMPSEC 2010»
13 years 5 months ago
On the symbiosis of specification-based and anomaly-based detection
Natalia Stakhanova, Samik Basu, Johnny Wong
COMPSEC
2010
146views more  COMPSEC 2010»
13 years 5 months ago
An intruder model with message inspection for model checking security protocols
Model checking security protocols is based on an intruder model that represents the eavesdropping or interception of the exchanged messages, while at the same time performs attack...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
COMPSEC
2010
67views more  COMPSEC 2010»
13 years 5 months ago
Hybrid spam filtering for mobile communication
Ji Won Yoon, Hyoungshick Kim, Jun Ho Huh