The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ISDF"( http://dblp.L3S.de/Venues/ISDF )

URL (DBLP): http://dblp.uni-trier.de/db/conf/isdf

Publication years (Num. hits)
2009 (19) 2010 (1)
Publication types (Num. hits)
inproceedings(19) proceedings(1)
Venues (Conferences, Journals, ...)
ISDF(20)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 20 publication records. Showing 20 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Dasun Weerasinghe (eds.) Information Security and Digital Forensics - First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers Search on Bibsonomy ISDF The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Tanko Ishaya, Jason R. C. Nurse Cross-Enterprise Policy Model for e-Business Web Services Security. Search on Bibsonomy ISDF The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Chang-Tsun Li, Chih-Yuan Chang, Yue Li 0013 On the Repudiability of Device Identification and Image Integrity Verification Using Sensor Pattern Noise. Search on Bibsonomy ISDF The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Dimitrios Frangiskatos, Mona Ghassemian, Diane Gan Technology Perspective: Is Green IT a Threat to IT Security? Search on Bibsonomy ISDF The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Samuel Chindaro, Ziheng Zhou, Ming W. R. Ng, Farzin Deravi An Adaptive Fusion Framework for Fault-Tolerant Multibiometrics. Search on Bibsonomy ISDF The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Joshua Ojo Nehinbe Adaptive Clustering Method for Reclassifying Network Intrusions. Search on Bibsonomy ISDF The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Divya, Sanjeev Kumar Security Challenges in Multihop Wireless Mesh Networks-A Survey. Search on Bibsonomy ISDF The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ziheng Zhou, Samuel Chindaro, Farzin Deravi Face Recognition Using Balanced Pairwise Classifier Training. Search on Bibsonomy ISDF The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Rajanish Dass, Sujoy Pal Challenges of Identity Management - A Context in Rural India. Search on Bibsonomy ISDF The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Fei Peng, Re-Si Guo, Chang-Tsun Li, Min Long A Semi-fragile Watermarking Algorithm for Authenticating 2D Engineering Graphics Based on Log-Polar Transformation. Search on Bibsonomy ISDF The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Fadi El-Moussa 0001, Parmindher Mudhar, Andy Jones Overview of SIP Attacks and Countermeasures. Search on Bibsonomy ISDF The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ahsan Subhan, Monis Akhlaq, Faeiz Alserhani, Irfan-Ullah Awan, John Mellor, Andrea J. Cullen, Pravin Mirchandani Smart Logic - Preventing Packet Loss in High Speed Network Intrusion Detection Systems. Search on Bibsonomy ISDF The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Clive Blackwell A Security Architecture to Protect Against Data Loss. Search on Bibsonomy ISDF The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1K. Haribabu 0001, Chittaranjan Hota, Saravana Detecting Sybils in Peer-to-Peer File Replication Systems. Search on Bibsonomy ISDF The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Qin Zhou, Nigel R. Poole Forensic Investigation of the Soft-Modded PlayStation Portable (PSP). Search on Bibsonomy ISDF The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Brian C. Tompsett Ethical Dilemmas in Teaching Computer and Internet Security. Search on Bibsonomy ISDF The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Joshua Ojo Nehinbe A Simple Method for Improving Intrusion Detections in Corporate Networks. Search on Bibsonomy ISDF The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Monis Akhlaq, Faeiz Alserhani, Irfan-Ullah Awan, John Mellor, Andrea J. Cullen, Pravin Mirchandani Virtualization Efficacy for Network Intrusion Detection Systems in High Speed Environment. Search on Bibsonomy ISDF The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Divya, Sanjeev Kumar Analysis of Denial of Service Attacks in IEEE 802.11s Wireless Mesh Networks. Search on Bibsonomy ISDF The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Dasun Weerasinghe, Muttukrishnan Rajarajan, Veselin Rakocevic Parameter Based Access Control Model for Mobile Handsets. Search on Bibsonomy ISDF The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #20 of 20 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license