Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Albert Sitek, Zbigniew Kotulski |
Cardholder's Reputation System for Contextual Risk Management in Payment Transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings, pp. 158-170, 2017, Springer, 978-3-319-65126-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Alexander Branitskiy, Igor V. Kotenko |
Network Anomaly Detection Based on an Ensemble of Adaptive Binary Classifiers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings, pp. 143-157, 2017, Springer, 978-3-319-65126-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Maxim Kolomeec, Gustavo Gonzalez Granadillo, Elena Doynikova, Andrey Chechulin, Igor V. Kotenko, Hervé Debar |
Choosing Models for Security Metrics Visualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings, pp. 75-87, 2017, Springer, 978-3-319-65126-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Nanda Kumar Thanigaivelan, Ethiopia Nigussie, Seppo Virtanen, Jouni Isoaho |
Towards Self-aware Approach for Mobile Devices Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings, pp. 171-182, 2017, Springer, 978-3-319-65126-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Steven Drager 0001, Janusz Zalewski |
A Novel and Unifying View of Trustworthiness in Cyberphysical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings, pp. 327-338, 2017, Springer, 978-3-319-65126-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Laurens Lemaire, Jan Vossaert, Bart De Decker, Vincent Naessens |
Extending FAST-CPS for the Analysis of Data Flows in Cyber-Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings, pp. 37-49, 2017, Springer, 978-3-319-65126-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Evgenia Novikova, Ivan Murenin |
Visualization-Driven Approach to Anomaly Detection in the Movement of Critical Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings, pp. 50-61, 2017, Springer, 978-3-319-65126-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Qi Dong, Zekun Yang, Yu Chen 0002, Xiaohua Li, Kai Zeng 0001 |
Anomaly Detection in Cognitive Radio Networks Exploiting Singular Spectrum Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings, pp. 247-259, 2017, Springer, 978-3-319-65126-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | An Braeken, Sergey Bezzateev, Abdellah Touhafi, Natalia Voloshina |
HEPPA: Highly Efficient Privacy Preserving Authentication for ITS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings, pp. 260-271, 2017, Springer, 978-3-319-65126-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Marcin Niemiec, Maciej Francikiewicz |
Security Assessment of Cryptographic Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings, pp. 299-312, 2017, Springer, 978-3-319-65126-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Omar Iraqi, Hanan El Bakkali |
Toward Third-Party Immune Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings, pp. 348-359, 2017, Springer, 978-3-319-65126-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Emrah Korkmaz, Matthew Davis, Andrey M. Dolgikh, Victor A. Skormin |
Detection and Mitigation of Time Delay Injection Attacks on Industrial Control Systems with PLCs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings, pp. 62-74, 2017, Springer, 978-3-319-65126-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Janusz Górski, Katarzyna Lukasiewicz |
Meeting Requirements Imposed by Secure Software Development Standards and Still Remaining Agile. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings, pp. 3-15, 2017, Springer, 978-3-319-65126-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jacek Rak, John Bay, Igor V. Kotenko, Leonard J. Popyack, Victor A. Skormin, Krzysztof Szczypiorski (eds.) |
Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![Springer, 978-3-319-65126-2 The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Anton Kopeikin, Arnur G. Tokhtabayev, Nurlan Tashatov, Dina Satybaldina |
tLab: A System Enabling Malware Clustering Based on Suspicious Activity Trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings, pp. 195-210, 2017, Springer, 978-3-319-65126-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Vasileios Gkioulos, Stephen D. Wolthusen |
Security Requirements for the Deployment of Services Across Tactical SOA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings, pp. 115-127, 2017, Springer, 978-3-319-65126-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Leonard J. Popyack, Jay Biernat |
Race Condition Faults in Multi-core Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings, pp. 104-114, 2017, Springer, 978-3-319-65126-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Roberto Metere, Changyu Dong |
Automated Cryptographic Analysis of the Pedersen Commitment Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings, pp. 275-287, 2017, Springer, 978-3-319-65126-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Matthew Davis, Emrah Korkmaz, Andrey M. Dolgikh, Victor A. Skormin |
Resident Security System for Government/Industry Owned Computers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings, pp. 185-194, 2017, Springer, 978-3-319-65126-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Alexander A. Grusho, Nick A. Grusho, Michael I. Zabezhailo, Alexander Zatsarinny, Elena E. Timonina |
Information Security of SDN on the Basis of Meta Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings, pp. 339-347, 2017, Springer, 978-3-319-65126-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Alexander A. Grusho |
Data Mining and Information Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings, pp. 28-33, 2017, Springer, 978-3-319-65126-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jerzy Konorski, Karol Rydzewski |
Nodal Cooperation Equilibrium Analysis in Multi-hop Wireless Ad Hoc Networks with a Reputation System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings, pp. 131-142, 2017, Springer, 978-3-319-65126-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Hubert Ostap, Ryszard Antkiewicz |
A Concept of Clustering-Based Method for Botnet Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings, pp. 223-234, 2017, Springer, 978-3-319-65126-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Stig Fr. Mjølsnes, Ruxandra F. Olimid |
Easy 4G/LTE IMSI Catchers for Non-Programmers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings, pp. 235-246, 2017, Springer, 978-3-319-65126-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Andrew Hutchison |
Adapting Enterprise Security Approaches for Evolving Cloud Processing and Networking Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings, pp. 16-27, 2017, Springer, 978-3-319-65126-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Arnur G. Tokhtabayev, Anton Kopeikin, Nurlan Tashatov, Dina Satybaldina |
Malware Analysis and Detection via Activity Trees in User-Dependent Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings, pp. 211-222, 2017, Springer, 978-3-319-65126-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Valery I. Korzhik, Ivan Fedyanin, Artur Godlewski, Guillermo Morales-Luna |
Steganalysis Based on Statistical Properties of the Encrypted Messages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings, pp. 288-298, 2017, Springer, 978-3-319-65126-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Vasileios Mavroeidis, Mathew Nicho |
Quick Response Code Secure: A Cryptographically Secure Anti-Phishing Tool for QR Code Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings, pp. 313-324, 2017, Springer, 978-3-319-65126-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Deeraj Nagothu, Andrey M. Dolgikh |
iCrawl: A Visual High Interaction Web Crawler. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings, pp. 91-103, 2017, Springer, 978-3-319-65126-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Gustavo Gonzalez Granadillo, Hervé Debar, Grégoire Jacob, Chrystel Gaber, Mohammed Achemlal |
Individual Countermeasure Selection Based on the Return On Response Investment Index. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings, pp. 156-170, 2012, Springer, 978-3-642-33703-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Dmitry P. Zegzhda, Tatiana V. Stepanova |
Stochastic Model of Interaction between Botnets and Distributed Computer Defense Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings, pp. 218-225, 2012, Springer, 978-3-642-33703-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Peter D. Zegzhda, Dmitry P. Zegzhda, Maxim O. Kalinin, Artem S. Konoplev |
Security Modeling of Grid Systems Using Petri Nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings, pp. 299-308, 2012, Springer, 978-3-642-33703-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Benjamin Livshits |
Finding Malware on a Web Scale. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings, pp. 1-2, 2012, Springer, 978-3-642-33703-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Josée Desharnais, Erwanne P. Kanyabwero, Nadia Tawbi |
Enforcing Information Flow Policies by a Three-Valued Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings, pp. 114-129, 2012, Springer, 978-3-642-33703-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Brendan Kerrigan, Yu Chen 0002 |
A Study of Entropy Sources in Cloud Computers: Random Number Generation on Cloud Hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings, pp. 286-298, 2012, Springer, 978-3-642-33703-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Joe-Kai Tsay, Stig Fr. Mjølsnes |
A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings, pp. 65-76, 2012, Springer, 978-3-642-33703-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Julian Schütte, Roland Rieke, Timo Winkelvos |
Model-Based Security Event Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings, pp. 181-190, 2012, Springer, 978-3-642-33703-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Gianluca Dini, Fabio Martinelli, Andrea Saracino, Daniele Sgandurra |
MADAM: A Multi-level Anomaly Detector for Android Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings, pp. 240-253, 2012, Springer, 978-3-642-33703-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yosra Ben Mustapha, Hervé Debar, Grégoire Jacob |
Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings, pp. 203-217, 2012, Springer, 978-3-642-33703-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Vasily Desnitsky, Igor V. Kotenko, Andrey Chechulin |
Configuration-Based Approach to Embedded Device Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings, pp. 270-285, 2012, Springer, 978-3-642-33703-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Viktor Yakovlev, Valery I. Korzhik, Mihail Bakaev, Guillermo Morales-Luna |
Optimization of Key Distribution Protocols Based on Extractors for Noisy Channels within Active Adversaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings, pp. 51-64, 2012, Springer, 978-3-642-33703-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Roland Rieke, Luigi Coppolino, Andrew Hutchison, Elsa Prieto, Chrystel Gaber |
Security and Reliability Requirements for Advanced Security Event Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings, pp. 171-180, 2012, Springer, 978-3-642-33703-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Vladimir A. Oleshchuk |
Trust-Aware RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings, pp. 97-107, 2012, Springer, 978-3-642-33703-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Tyrone Cadenhead, Murat Kantarcioglu, Vaibhav Khadilkar, Bhavani Thuraisingham |
Design and Implementation of a Cloud-Based Assured Information Sharing System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings, pp. 36-50, 2012, Springer, 978-3-642-33703-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Fabio Martinelli, Ilaria Matteucci, Charles Morisset |
From Qualitative to Quantitative Enforcement of Security Policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings, pp. 22-35, 2012, Springer, 978-3-642-33703-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Chaitanya Yavvari, Arnur G. Tokhtabayev, Huzefa Rangwala, Angelos Stavrou |
Malware Characterization Using Behavioral Components. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings, pp. 226-239, 2012, Springer, 978-3-642-33703-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Zhaohui Wang, Ryan Johnson 0002, Rahul Murmuria, Angelos Stavrou |
Exposing Security Risks for Commercial Mobile Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings, pp. 3-21, 2012, Springer, 978-3-642-33703-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Tigran Avanesov, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani |
Towards the Orchestration of Secured Services under Non-disclosure Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings, pp. 130-145, 2012, Springer, 978-3-642-33703-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Alexander A. Moldovyan, Nikolay A. Moldovyan, Evgenia Novikova |
Blind 384-bit Digital Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings, pp. 77-83, 2012, Springer, 978-3-642-33703-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Peter D. Zegzhda, Dmitry P. Zegzhda, Alexey V. Nikolskiy |
Using Graph Theory for Cloud System Security Modeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings, pp. 309-318, 2012, Springer, 978-3-642-33703-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Andrey M. Dolgikh, Tomas Nykodym, Victor A. Skormin, Zachary Birnbaum |
Using Behavioral Modeling and Customized Normalcy Profiles as Protection against Targeted Cyber-Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings, pp. 191-202, 2012, Springer, 978-3-642-33703-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Igor V. Kotenko, Victor A. Skormin (eds.) |
Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![Springer, 978-3-642-33703-1 The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Xin Jin, Ravi S. Sandhu, Ram Krishnan |
RABAC: Role-Centric Attribute-Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings, pp. 84-96, 2012, Springer, 978-3-642-33703-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Alexander A. Grusho, Nikolai A. Grusho, Elena E. Timonina |
Alternative Mechanisms for Information Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings, pp. 108-113, 2012, Springer, 978-3-642-33703-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Andrey Chechulin, Igor V. Kotenko, Vasily Desnitsky |
An Approach for Network Information Flow Analysis for Systems of Embedded Components. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings, pp. 146-155, 2012, Springer, 978-3-642-33703-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Dmitriy Komashinskiy, Igor V. Kotenko |
Using Low-Level Dynamic Attributes for Malware Detection Based on Data Mining Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings, pp. 254-269, 2012, Springer, 978-3-642-33703-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Peter Teufl, Udo Payer, Guenther Lackner |
From NLP (Natural Language Processing) to MLP (Machine Language Processing). ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings, pp. 256-269, 2010, Springer, 978-3-642-14705-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Vasily Desnitsky, Igor V. Kotenko |
Security and Scalability of Remote Entrusting Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings, pp. 298-306, 2010, Springer, 978-3-642-14705-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Shiu-Kai Chin, Sarah Muccio, Susan Older, Thomas N. J. Vestal |
Policy-Based Design and Verification for Mission Assurance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings, pp. 125-138, 2010, Springer, 978-3-642-14705-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Roland Rieke, Zaharina Stoynova |
Predictive Security Analysis for Event-Driven Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings, pp. 321-328, 2010, Springer, 978-3-642-14705-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Dmitriy N. Moldovyan, Nikolay A. Moldovyan |
A New Hard Problem over Non-commutative Finite Groups for Cryptographic Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings, pp. 183-194, 2010, Springer, 978-3-642-14705-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Dmitry P. Zegzhda, Peter D. Zegzhda, Maxim O. Kalinin |
Clarifying Integrity Control at the Trusted Information Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings, pp. 337-344, 2010, Springer, 978-3-642-14705-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Wojciech Molisz, Jacek Rak |
A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings, pp. 307-320, 2010, Springer, 978-3-642-14705-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Leonid Domnitser, Nael B. Abu-Ghazaleh, Dmitry Ponomarev 0001 |
A Predictive Model for Cache-Based Side Channels in Multicore and Multithreaded Microprocessors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings, pp. 70-85, 2010, Springer, 978-3-642-14705-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Bart Preneel |
Cryptography for Network Security: Failures, Successes and Challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings, pp. 36-54, 2010, Springer, 978-3-642-14705-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yaroslav A. Markov, Maxim O. Kalinin |
Intellectual Intrusion Detection with Sequences Alignment Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings, pp. 217-228, 2010, Springer, 978-3-642-14705-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Glenn S. Benson, Shiu-Kai Chin, Sean Croston, Karthick Jayaraman, Susan Older |
Credentials Management for High-Value Transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings, pp. 169-182, 2010, Springer, 978-3-642-14705-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Dieter Gollmann |
Secure Applications without Secure Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings, pp. 21-31, 2010, Springer, 978-3-642-14705-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Igor Saenko 0001, Igor V. Kotenko |
Genetic Optimization of Access Control Schemes in Virtual Local Area Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings, pp. 209-216, 2010, Springer, 978-3-642-14705-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Antonio Muñoz 0001, Antonio Maña, Pablo Antón |
In the Track of the Agent Protection: A Solution Based on Cryptographic Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings, pp. 284-297, 2010, Springer, 978-3-642-14705-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Raphaël Khoury, Nadia Tawbi |
Using Equivalence Relations for Corrective Enforcement of Security Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings, pp. 139-154, 2010, Springer, 978-3-642-14705-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hervé Debar, Nizar Kheir, Nora Cuppens-Boulahia, Frédéric Cuppens |
Service Dependencies in Information Systems Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings, pp. 1-20, 2010, Springer, 978-3-642-14705-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jose Andre Morales, Erhan J. Kartaltepe, Shouhuai Xu, Ravi S. Sandhu |
Symptoms-Based Detection of Bot Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings, pp. 229-241, 2010, Springer, 978-3-642-14705-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ravi S. Sandhu, Ram Krishnan, Jianwei Niu 0001, William H. Winsborough |
Group-Centric Models for Secure and Agile Information Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings, pp. 55-69, 2010, Springer, 978-3-642-14705-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Alexander A. Grusho, Nikolai A. Grusho, Elena E. Timonina |
Problems of Modeling in the Analysis of Covert Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings, pp. 118-124, 2010, Springer, 978-3-642-14705-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Greg Morrisett |
Integrating Types and Specifications for Secure Software Development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings, pp. 32-35, 2010, Springer, 978-3-642-14705-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Krzysztof Sacha |
Credential Chain Discovery in RTT Trust Management Language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings, pp. 195-208, 2010, Springer, 978-3-642-14705-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya, Kevin A. Kwiat |
QoS-T: QoS Throttling to Elicit User Cooperation in Computer Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings, pp. 102-117, 2010, Springer, 978-3-642-14705-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ludovic Piètre-Cambacédès, Marc Bouissou |
Attack and Defense Modeling with BDMP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings, pp. 86-101, 2010, Springer, 978-3-642-14705-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Kraxberger, Peter Danner, Daniel M. Hein |
Secure Multi-Agent System for Multi-Hop Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings, pp. 270-283, 2010, Springer, 978-3-642-14705-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Dmitry P. Zegzhda, Ekaterina Rudina |
Virtual Environment Security Modeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings, pp. 329-336, 2010, Springer, 978-3-642-14705-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hai Thanh Nguyen 0001, Slobodan Petrovic, Katrin Franke |
A Comparison of Feature-Selection Methods for Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings, pp. 242-255, 2010, Springer, 978-3-642-14705-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Igor V. Kotenko, Victor A. Skormin (eds.) |
Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![Springer, 978-3-642-14705-0 The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Devrim Unal, Ozan Akar, M. Ufuk Çaglayan |
Model Checking of Location and Mobility Related Security Policy Specifications in Ambient Calculus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings, pp. 155-168, 2010, Springer, 978-3-642-14705-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Soon Seok Kim, Sang-Soo Yeo, Hong-Jin Park, Sung Kwon Kim |
A New Scheme for the Location Information Protection in Mobile Communication Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings, pp. 436-441, 2005, Springer, 3-540-29113-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Félix J. García Clemente, Jesús D. Jiménez Re, Gregorio Martínez Pérez, Antonio Fernandez Gómez-Skarmeta |
Policy-Driven Routing Management Using CIM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings, pp. 259-271, 2005, Springer, 3-540-29113-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jacques Demerjian, Ibrahim Hajjeh, Mohamad Badra, Salim Ferraz |
A Secure Way to Combine IPsec, NAT & DHCP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings, pp. 104-118, 2005, Springer, 3-540-29113-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Zhouyi Zhou, Bin Liang, Li Jiang, Wenchang Shi, Yeping He |
A Formal Description of SECIMOS Operating System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings, pp. 286-297, 2005, Springer, 3-540-29113-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Martin Schaffer, Peter Schartner |
Key Escrow with Tree-Based Access Structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings, pp. 454-459, 2005, Springer, 3-540-29113-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Vladimir Gorodetsky, Igor V. Kotenko, Victor A. Skormin (eds.) |
Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![Springer, 3-540-29113-X The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Artem Tishkov, Igor V. Kotenko, Ekaterina Sidelnikova |
Security Checker Architecture for Policy-Based Security Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings, pp. 460-465, 2005, Springer, 3-540-29113-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Dmitry P. Zegzhda, Alex M. Vovk |
Secure Hybrid Operating System "Linux over Fenix". ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings, pp. 272-285, 2005, Springer, 3-540-29113-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Ming-Yuh Huang |
Critical Information Assurance Challenges for Modern Large-Scale Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings, pp. 7-22, 2005, Springer, 3-540-29113-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Constantine Daicos, Scott Knight |
A Passive External Web Surveillance Technique for Private Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings, pp. 88-103, 2005, Springer, 3-540-29113-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Duncan A. Buell |
Calibrating Entropy Functions Applied to Computer Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings, pp. 76-87, 2005, Springer, 3-540-29113-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Bill Tsoumas, Stelios Dritsas, Dimitris Gritzalis |
An Ontology-Based Approach to Information Systems Security Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings, pp. 151-164, 2005, Springer, 3-540-29113-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
IS Security, Security Policy, Security Management, Security Ontology |
1 | Alexei Galatenko, Alexander A. Grusho, Alexander Kniazev, Elena E. Timonina |
Statistical Covert Channels Through PROXY Server. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings, pp. 424-429, 2005, Springer, 3-540-29113-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Mikhail I. Smirnov |
Trust by Workflow in Autonomic Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings, pp. 136-150, 2005, Springer, 3-540-29113-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Peter Schartner, Martin Schaffer |
Unique User-Generated Digital Pseudonyms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings, pp. 194-205, 2005, Springer, 3-540-29113-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | David M. Nicol, Michael Liljenstam |
Models and Analysis of Active Worm Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings, pp. 38-53, 2005, Springer, 3-540-29113-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|