Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
16 | Allan Tomlinson |
Developments in mobile communications security. |
Inf. Secur. Tech. Rep. |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Adrian Leung |
A mobile device management framework for secure service delivery. |
Inf. Secur. Tech. Rep. |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Francesca Saglietti, Norbert Oster, Florin Pinte |
White and grey-box verification and validation approaches for safety- and security-critical software systems. |
Inf. Secur. Tech. Rep. |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Dieter Gollmann |
Securing Web applications. |
Inf. Secur. Tech. Rep. |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Patricia A. H. Williams |
In a 'trusting' environment, everyone is responsible for information security. |
Inf. Secur. Tech. Rep. |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Marit Hansen, Andreas Pfitzmann, Sandra Steinbrecher |
Identity management throughout one's whole life. |
Inf. Secur. Tech. Rep. |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Christoph Krauß, Markus Schneider 0002, Claudia Eckert 0001 |
On handling insider attacks in wireless sensor networks. |
Inf. Secur. Tech. Rep. |
2008 |
DBLP DOI BibTeX RDF |
|
16 | John Steer, Ashish Popli |
Building secure business applications at Microsoft. |
Inf. Secur. Tech. Rep. |
2008 |
DBLP DOI BibTeX RDF |
|
16 | André van Cleeff |
Future consumer mobile phone security: A case study using the data-centric security model. |
Inf. Secur. Tech. Rep. |
2008 |
DBLP DOI BibTeX RDF |
|
16 | John P. McDermott, James Kirby, Bruce E. Montrose, Travis Johnson, Myong H. Kang |
Re-engineering Xen internals for higher-assurance security. |
Inf. Secur. Tech. Rep. |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Debi Ashenden |
Information Security management: A human challenge? |
Inf. Secur. Tech. Rep. |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Richard E. Overill |
ISMS insider intrusion prevention and detection. |
Inf. Secur. Tech. Rep. |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Keith Mayes, Konstantinos Markantonakis |
Mobile communication security controllers an evaluation paper. |
Inf. Secur. Tech. Rep. |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Jan Arild Audestad |
Internet as a multiple graph structure: The role of the transport layer. |
Inf. Secur. Tech. Rep. |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Kalle Burbeck, Simin Nadjm-Tehrani |
Adaptive real-time anomaly detection with incremental clustering. |
Inf. Secur. Tech. Rep. |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Raj Samani |
When networks collide. |
Inf. Secur. Tech. Rep. |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Erol Gelenbe |
Dealing with software viruses: A biological paradigm. |
Inf. Secur. Tech. Rep. |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Rodrigo Roman, Cristina Alcaraz, Javier López 0001 |
The role of Wireless Sensor Networks in the area of Critical Information Infrastructure Protection. |
Inf. Secur. Tech. Rep. |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Stephen D. Wolthusen |
ISTR special issue on critical infrastructure protection. |
Inf. Secur. Tech. Rep. |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Zia Hayat, Jeff Reeve, Chris Boutle |
Ubiquitous security for ubiquitous computing. |
Inf. Secur. Tech. Rep. |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Andrew P. Martin, Po-Wah Yau |
Grid security: Next steps. |
Inf. Secur. Tech. Rep. |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Uwe Aickelin, Julie Greensmith |
Sensing danger: Innate immunology for intrusion detection. |
Inf. Secur. Tech. Rep. |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Michael J. Ganley |
Introduction to this issue (12/4). |
Inf. Secur. Tech. Rep. |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Richard H. Paine |
Secure Mobile Architecture (SMA) - A way to fix the broken Internet. |
Inf. Secur. Tech. Rep. |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Walter Schmitz |
Simulation and test: Instruments for Critical Infrastructure Protection (CIP). |
Inf. Secur. Tech. Rep. |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Javier López 0001, Isaac Agudo, José A. Montenegro |
On the deployment of a real scalable delegation service. |
Inf. Secur. Tech. Rep. |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Kamran Shafi, Hussein A. Abbass |
Biologically-inspired Complex Adaptive Systems approaches to Network Intrusion Detection. |
Inf. Secur. Tech. Rep. |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Adrian Leung, Yingli Sheng, Haitham S. Cruickshank |
The security challenges for mobile ubiquitous services. |
Inf. Secur. Tech. Rep. |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Anil Somayaji |
Immunology, diversity, and homeostasis: The past and future of biologically inspired computer defenses. |
Inf. Secur. Tech. Rep. |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Nils Kalstad Svendsen, Stephen D. Wolthusen |
Connectivity models of interdependency in mixed-type critical infrastructure networks. |
Inf. Secur. Tech. Rep. |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Jianying Zhou 0001, Wee-Yung Chin, Rodrigo Roman, Javier López 0001 |
An effective multi-layered defense framework against spam. |
Inf. Secur. Tech. Rep. |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Christof Paar, André Weimerskirch |
Embedded security in a pervasive world. |
Inf. Secur. Tech. Rep. |
2007 |
DBLP DOI BibTeX RDF |
|
16 | E. Eugene Schultz |
Risks due to convergence of physical security systems and information technology environments. |
Inf. Secur. Tech. Rep. |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Dipankar Dasgupta |
Immuno-inspired autonomic system for cyber defense. |
Inf. Secur. Tech. Rep. |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Richard E. Overill |
Computational immunology and anomaly detection. |
Inf. Secur. Tech. Rep. |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Allan Tomlinson |
Editorial. |
Inf. Secur. Tech. Rep. |
2007 |
DBLP DOI BibTeX RDF |
|
16 | David W. Chadwick |
Coordinated decision making in distributed applications. |
Inf. Secur. Tech. Rep. |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Robert Ghanea-Hercock |
Survival in cyberspace. |
Inf. Secur. Tech. Rep. |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Khaled Elgoarany, Mohamed Eltoweissy |
Security in Mobile IPv6: A survey. |
Inf. Secur. Tech. Rep. |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Haibo Chen 0001, Jieyun Chen, Wenbo Mao, Fei Yan |
Daonity - Grid security from two levels of virtualization. |
Inf. Secur. Tech. Rep. |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Andrew Jones 0002 |
Convergence. |
Inf. Secur. Tech. Rep. |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Paul King |
In the new converged world are we secure enough? |
Inf. Secur. Tech. Rep. |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Mark Burgess |
Biology, immunology and information security. |
Inf. Secur. Tech. Rep. |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Richard Clayton |
Can CLI be trusted? |
Inf. Secur. Tech. Rep. |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Chris Sundt |
Information security and the law. |
Inf. Secur. Tech. Rep. |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Ian Walden |
Communication service providers: Forensic source and investigatory tool. |
Inf. Secur. Tech. Rep. |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Kenneth G. Paterson |
A cryptographic tour of the IPsec standards. |
Inf. Secur. Tech. Rep. |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Stephen D. Wolthusen |
Windows device interface security. |
Inf. Secur. Tech. Rep. |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Gary Hardy |
Using IT governance and COBIT to deliver value with IT and respond to legal, regulatory and compliance challenges. |
Inf. Secur. Tech. Rep. |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Brian Berger |
Security standards: An end-user perspective. |
Inf. Secur. Tech. Rep. |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Tim Wright |
Security considerations for broadcast systems. |
Inf. Secur. Tech. Rep. |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Jens Rüdinger |
The complexity of DPA type side channel attacks and their dependency on the algorithm design. |
Inf. Secur. Tech. Rep. |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Mike Bond, Jolyon Clulow |
Integrity of intention (a theory of types for security APIs). |
Inf. Secur. Tech. Rep. |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Keith Mayes, Konstantinos Markantonakis |
On the potential of high density smart cards. |
Inf. Secur. Tech. Rep. |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Matthew J. B. Robshaw |
An overview of RFID tags and new cryptographic developments. |
Inf. Secur. Tech. Rep. |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Scarlet Schwiderski-Grosche |
Security: An end user perspective. |
Inf. Secur. Tech. Rep. |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Stefek Zaba |
Digital signature legislation: The first 10 years. |
Inf. Secur. Tech. Rep. |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Richard Walton |
Cryptography and trust. |
Inf. Secur. Tech. Rep. |
2006 |
DBLP DOI BibTeX RDF |
|
16 | A. A. Abimbola, J. M. Munoz, William J. Buchanan |
NetHost-sensor: Monitoring a target host's application via system calls. |
Inf. Secur. Tech. Rep. |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Geraint Price |
Editorial for v.11 n.4 of the Information Security Technical Report: "Windows Security Revisited". |
Inf. Secur. Tech. Rep. |
2006 |
DBLP DOI BibTeX RDF |
|
16 | J. Stuart Broderick |
ISMS, security standards and security regulations. |
Inf. Secur. Tech. Rep. |
2006 |
DBLP DOI BibTeX RDF |
|
16 | David Lacey |
A new institute for a new millennium. |
Inf. Secur. Tech. Rep. |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Michael Ward |
EMV card payments - An update. |
Inf. Secur. Tech. Rep. |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Chez Ciechanowicz |
Editorial. |
Inf. Secur. Tech. Rep. |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Brian A. LaMacchia, John Manferdelli |
New Vistas in elliptic curve cryptography. |
Inf. Secur. Tech. Rep. |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Katrin Borcea-Pfitzmann, Marit Hansen, Katja Liesebach, Andreas Pfitzmann, Sandra Steinbrecher |
What user-controlled identity management should learn from communities. |
Inf. Secur. Tech. Rep. |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Otto Bernecker |
Biometrics: security: An end user perspective. |
Inf. Secur. Tech. Rep. |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Richard Walton |
The Computer Misuse Act. |
Inf. Secur. Tech. Rep. |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Paul England, John Manferdelli |
Virtual machines for enterprise desktop security. |
Inf. Secur. Tech. Rep. |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Carlos Cid |
Recent developments in cryptographic hash functions: Security implications and future directions. |
Inf. Secur. Tech. Rep. |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Phil Pinder |
Preparing Information Security for legal and regulatory compliance (Sarbanes-Oxley and Basel II). |
Inf. Secur. Tech. Rep. |
2006 |
DBLP DOI BibTeX RDF |
|
16 | I. Phillips |
Windows Vista security: First impressions. |
Inf. Secur. Tech. Rep. |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Michael J. Ganley |
Introduction - Cryptography. |
Inf. Secur. Tech. Rep. |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Andrew Charlesworth |
The future of UK data protection regulation. |
Inf. Secur. Tech. Rep. |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Geraint Price |
Editorial: "The security perimeter". |
Inf. Secur. Tech. Rep. |
2005 |
DBLP DOI BibTeX RDF |
|
16 | G. Edward Suh, Charles W. O'Donnell, Srinivas Devadas |
AEGIS: A single-chip secure processor. |
Inf. Secur. Tech. Rep. |
2005 |
DBLP DOI BibTeX RDF |
|
16 | David Lacey |
Inventing the future - The vision of the Jericho Forum. |
Inf. Secur. Tech. Rep. |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Ahmad-Reza Sadeghi, Christian Stüble |
Towards multilaterally secure computing platforms - with open source and trusted computing. |
Inf. Secur. Tech. Rep. |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Mark Curphey |
Web services: Developers dream or hackers heaven? |
Inf. Secur. Tech. Rep. |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Gerhard Eschelbeck |
The Laws of Vulnerabilities: Which security vulnerabilities really matter? |
Inf. Secur. Tech. Rep. |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Michael J. Ganley |
Introduction - Intrusion detection and prevention. |
Inf. Secur. Tech. Rep. |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Grit Denker, Lalana Kagal, Tim Finin |
Security in the Semantic Web using OWL. |
Inf. Secur. Tech. Rep. |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Tadeusz Pietraszek, Axel Tanner |
Data mining and machine learning - Towards reducing false positives in intrusion detection. |
Inf. Secur. Tech. Rep. |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Konstantin Beznosov, Donald J. Flinn, Shirley Kawamoto, Bret Hartman |
Introduction to Web services and their security. |
Inf. Secur. Tech. Rep. |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Paul Kearney |
Message level security for web services. |
Inf. Secur. Tech. Rep. |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Maria Papadaki, Steven M. Furnell |
Informing the decision process in an automated intrusion response system. |
Inf. Secur. Tech. Rep. |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Geoffrey Strongin |
Trusted computing using AMD "Pacifica" and "Presidio" secure virtual machine technology. |
Inf. Secur. Tech. Rep. |
2005 |
DBLP DOI BibTeX RDF |
|
16 | David Safford, Mimi Zohar |
Trusted computing and open source. |
Inf. Secur. Tech. Rep. |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Brian Hernacki, Jeremy Bennett, James A. Hoagland |
An overview of network evasion methods. |
Inf. Secur. Tech. Rep. |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Phil Cracknell |
Why 'Phish' when you can Trawl? |
Inf. Secur. Tech. Rep. |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Jason Crampton |
Introduction to February 2005 issue of ISTR. |
Inf. Secur. Tech. Rep. |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Seth D. Schoen |
Compatibility, competition, and control in trusted computing environments. |
Inf. Secur. Tech. Rep. |
2005 |
DBLP DOI BibTeX RDF |
|
16 | David W. Chadwick |
Authorisation in Grid computing. |
Inf. Secur. Tech. Rep. |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Christian Geuer-Pollmann, Joris Claessens |
Web services and web service security standards. |
Inf. Secur. Tech. Rep. |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Allan MacPhee, Mark O'Neill |
Notes from the field: Implementing a security solution for Web Services. |
Inf. Secur. Tech. Rep. |
2005 |
DBLP DOI BibTeX RDF |
|
16 | |
Next-generation intrusion prevention: Accounting for the attack timeline. |
Inf. Secur. Tech. Rep. |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Brian Berger |
Trusted computing group history. |
Inf. Secur. Tech. Rep. |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Graham Palmer |
De-Perimeterisation: Benefits and limitations. |
Inf. Secur. Tech. Rep. |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Andreas Fuchsberger |
Intrusion Detection Systems and Intrusion Prevention Systems. |
Inf. Secur. Tech. Rep. |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Carlin R. Covey, Mark D. Redman, Thomas E. Tkacik |
An Advanced Trusted Platform for mobile phone devices. |
Inf. Secur. Tech. Rep. |
2005 |
DBLP DOI BibTeX RDF |
|